phpmyadmin (4:3.1.2-1ubuntu0.1) jaunty-security; urgency=low

  * SECURITY UPDATE: arbitrary file disclosure via directory traversal in
    bs_disp_as_mime_type.php
    - debian/patches/041-security-CVE-2009-1148.dpatch: check parameters
      before using in bs_disp_as_mime_type.php.
    - CVE-2009-1148
  * SECURITY UPDATE: arbitrary HTTP headers injection via CRLF injection in
    bs_disp_as_mime_type.php
    - Fixed in the CVE-2009-1148 patch
    - CVE-2009-1149
  * SECURITY UPDATE: code injection via multiple cross-site scripting
    vulnerabilities in display_export.lib.php
    - debian/patches/042-security-CVE-2009-1150.dpatch: strip special chars
      in libraries/display_export.lib.php.
    - CVE-2009-1150
  * SECURITY UPDATE: code injection via configuration files
    - debian/patches/043-security-CVE-2009-1285.dpatch: clean up key names
      in setup/lib/ConfigFile.class.php.
    - CVE-2009-1285
  * SECURITY UPDATE: code injection via cross-site scripting from crafted
    SQL bookmark 
    - debian/patches/044-security-CVE-2009-2284.dpatch: strip special
      characters in libraries/common.lib.php and sql.php.
    - CVE-2009-2284

 -- Marc Deslauriers <[email protected]>  Sun, 05 Jul 2009
09:50:12 -0400

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-1148

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-1149

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-1285

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-2284

** Changed in: phpmyadmin (Ubuntu Jaunty)
       Status: Fix Committed => Fix Released

-- 
phpMyAdmin: CVE-2009-1151: Arbitrary code execution
https://bugs.launchpad.net/bugs/387215
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to