ALT-BU-2014-2766-1
Branch p7 update bulletin.
Closed bugs
Обновить версию до текущей в Сизифе
Package phpMyAdmin updated to version 4.1.14-alt1 for branch p7 in task 119280.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-1879
Cross-site scripting (XSS) vulnerability in import.php in phpMyAdmin before 4.1.7 allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename in an import action.
- openSUSE-SU-2014:0344
- openSUSE-SU-2014:0344
- 59832
- 59832
- http://www.phpmyadmin.net/home_page/security/PMASA-2014-1.php
- http://www.phpmyadmin.net/home_page/security/PMASA-2014-1.php
- 65717
- 65717
- https://github.com/phpmyadmin/phpmyadmin/commit/968d5d5f486820bfa30af046f063b9f23304e14a
- https://github.com/phpmyadmin/phpmyadmin/commit/968d5d5f486820bfa30af046f063b9f23304e14a
Modified: 2024-11-21
CVE-2015-2206
libraries/select_lang.lib.php in phpMyAdmin 4.0.x before 4.0.10.9, 4.2.x before 4.2.13.2, and 4.3.x before 4.3.11.1 includes invalid language values in unknown-language error responses that contain a CSRF token and may be sent with HTTP compression, which makes it easier for remote attackers to conduct a BREACH attack and determine this token via a series of crafted requests.
- FEDORA-2015-3287
- FEDORA-2015-3287
- FEDORA-2015-3329
- FEDORA-2015-3329
- FEDORA-2015-3336
- FEDORA-2015-3336
- openSUSE-SU-2015:1191
- openSUSE-SU-2015:1191
- DSA-3382
- DSA-3382
- MDVSA-2015:186
- MDVSA-2015:186
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-1.php
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-1.php
- 72949
- 72949
- 1031871
- 1031871
- https://github.com/phpmyadmin/phpmyadmin/commit/b2f1e895038a5700bf8e81fb9a5da36cbdea0eeb
- https://github.com/phpmyadmin/phpmyadmin/commit/b2f1e895038a5700bf8e81fb9a5da36cbdea0eeb
Modified: 2024-11-21
CVE-2015-3902
Multiple cross-site request forgery (CSRF) vulnerabilities in the setup process in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 allow remote attackers to hijack the authentication of administrators for requests that modify the configuration file.
- openSUSE-SU-2015:1191
- openSUSE-SU-2015:1191
- DSA-3382
- DSA-3382
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-2.php
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-2.php
- 74657
- 74657
- 1032404
- 1032404
- https://github.com/phpmyadmin/phpmyadmin/commit/ee92eb9bab8e2d546756c1d4aec81ec7c8e44b83
- https://github.com/phpmyadmin/phpmyadmin/commit/ee92eb9bab8e2d546756c1d4aec81ec7c8e44b83
Modified: 2024-11-21
CVE-2015-3903
libraries/Config.class.php in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 disables X.509 certificate verification for GitHub API calls over SSL, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
- http://cxsecurity.com/issue/WLB-2015050095
- http://cxsecurity.com/issue/WLB-2015050095
- openSUSE-SU-2015:1191
- openSUSE-SU-2015:1191
- http://packetstormsecurity.com/files/131954/phpMyAdmin-4.4.6-Man-In-The-Middle.html
- http://packetstormsecurity.com/files/131954/phpMyAdmin-4.4.6-Man-In-The-Middle.html
- DSA-3382
- DSA-3382
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-3.php
- http://www.phpmyadmin.net/home_page/security/PMASA-2015-3.php
- 20150514 phpMyAdmin 4.4.6 Man-In-the-Middle API Github
- 20150514 phpMyAdmin 4.4.6 Man-In-the-Middle API Github
- 74660
- 74660
- 1032403
- 1032403
- https://github.com/phpmyadmin/phpmyadmin/commit/5ebc4daf131dd3bd646326267f3e765d0249bbb4
- https://github.com/phpmyadmin/phpmyadmin/commit/5ebc4daf131dd3bd646326267f3e765d0249bbb4
Modified: 2024-11-21
CVE-2015-8669
libraries/config/messages.inc.php in phpMyAdmin 4.0.x before 4.0.10.12, 4.4.x before 4.4.15.2, and 4.5.x before 4.5.3.1 allows remote attackers to obtain sensitive information via a crafted request, which reveals the full path in an error message.
- openSUSE-SU-2016:0067
- openSUSE-SU-2016:0067
- 1034806
- 1034806
- https://github.com/phpmyadmin/phpmyadmin/commit/c4d649325b25139d7c097e56e2e46cc7187fae45
- https://github.com/phpmyadmin/phpmyadmin/commit/c4d649325b25139d7c097e56e2e46cc7187fae45
- https://www.phpmyadmin.net/security/PMASA-2015-6/
- https://www.phpmyadmin.net/security/PMASA-2015-6/
Modified: 2024-11-21
CVE-2016-2560
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.15, 4.4.x before 4.4.15.5, and 4.5.x before 4.5.5.1 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted Host HTTP header, related to libraries/Config.class.php; (2) crafted JSON data, related to file_echo.php; (3) a crafted SQL query, related to js/functions.js; (4) the initial parameter to libraries/server_privileges.lib.php in the user accounts page; or (5) the it parameter to libraries/controllers/TableSearchController.class.php in the zoom search page.
- FEDORA-2016-65da02b95c
- FEDORA-2016-65da02b95c
- FEDORA-2016-02ee5b4002
- FEDORA-2016-02ee5b4002
- openSUSE-SU-2016:0663
- openSUSE-SU-2016:0663
- openSUSE-SU-2016:0666
- openSUSE-SU-2016:0666
- DSA-3627
- DSA-3627
- https://github.com/phpmyadmin/phpmyadmin/commit/38fa1191049ac0c626a6684eea52068dfbbb5078
- https://github.com/phpmyadmin/phpmyadmin/commit/38fa1191049ac0c626a6684eea52068dfbbb5078
- https://github.com/phpmyadmin/phpmyadmin/commit/41c4e0214c286f28830cca54423b5db57e7c0ce4
- https://github.com/phpmyadmin/phpmyadmin/commit/41c4e0214c286f28830cca54423b5db57e7c0ce4
- https://github.com/phpmyadmin/phpmyadmin/commit/7877a9c0084bf8ae15cbd8d2729b126271f682cc
- https://github.com/phpmyadmin/phpmyadmin/commit/7877a9c0084bf8ae15cbd8d2729b126271f682cc
- https://github.com/phpmyadmin/phpmyadmin/commit/ab1283e8366c97a155d4e9ae58628a248458ea32
- https://github.com/phpmyadmin/phpmyadmin/commit/ab1283e8366c97a155d4e9ae58628a248458ea32
- https://github.com/phpmyadmin/phpmyadmin/commit/c842a0de9288033d25404d1d6eb22dd83033675f
- https://github.com/phpmyadmin/phpmyadmin/commit/c842a0de9288033d25404d1d6eb22dd83033675f
- https://www.phpmyadmin.net/security/PMASA-2016-11/
- https://www.phpmyadmin.net/security/PMASA-2016-11/
Modified: 2024-11-21
CVE-2016-4412
An issue was discovered in phpMyAdmin. A user can be tricked into following a link leading to phpMyAdmin, which after authentication redirects to another malicious site. The attacker must sniff the user's valid phpMyAdmin token. All 4.0.x versions (prior to 4.0.10.16) are affected.
Modified: 2024-11-21
CVE-2016-5701
setup/frames/index.inc.php in phpMyAdmin 4.0.10.x before 4.0.10.16, 4.4.15.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to conduct BBCode injection attacks against HTTP sessions via a crafted URI.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- DSA-3627
- DSA-3627
- 91383
- 91383
- https://github.com/phpmyadmin/phpmyadmin/commit/1dca386505f396f0c2035112a403cc80768a141f
- https://github.com/phpmyadmin/phpmyadmin/commit/1dca386505f396f0c2035112a403cc80768a141f
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-17/
- https://www.phpmyadmin.net/security/PMASA-2016-17/
Modified: 2024-11-21
CVE-2016-5706
js/get_scripts.js.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to cause a denial of service via a large array in the scripts parameter.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- DSA-3627
- DSA-3627
- 91376
- 91376
- https://github.com/phpmyadmin/phpmyadmin/commit/4767f24ea4c1e3822ce71a636c341e8ad8d07aa6
- https://github.com/phpmyadmin/phpmyadmin/commit/4767f24ea4c1e3822ce71a636c341e8ad8d07aa6
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-22/
- https://www.phpmyadmin.net/security/PMASA-2016-22/
Modified: 2024-11-21
CVE-2016-5730
phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to obtain sensitive information via vectors involving (1) an array value to FormDisplay.php, (2) incorrect data to validate.php, (3) unexpected data to Validator.php, (4) a missing config directory during setup, or (5) an incorrect OpenID identifier data type, which reveals the full path in an error message.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- 91379
- 91379
- https://github.com/phpmyadmin/phpmyadmin/commit/27664605b945b13e1d2b71adea822ace2099cc96
- https://github.com/phpmyadmin/phpmyadmin/commit/27664605b945b13e1d2b71adea822ace2099cc96
- https://github.com/phpmyadmin/phpmyadmin/commit/331c560fbfa0e7d2dce674b5e88e983c5f2a451d
- https://github.com/phpmyadmin/phpmyadmin/commit/331c560fbfa0e7d2dce674b5e88e983c5f2a451d
- https://github.com/phpmyadmin/phpmyadmin/commit/96e0aa35653ec0c66084a7e9343465e16c1f769b
- https://github.com/phpmyadmin/phpmyadmin/commit/96e0aa35653ec0c66084a7e9343465e16c1f769b
- https://github.com/phpmyadmin/phpmyadmin/commit/b0180f18c828706af3a6800f0fb01a536d3ef8c7
- https://github.com/phpmyadmin/phpmyadmin/commit/b0180f18c828706af3a6800f0fb01a536d3ef8c7
- https://github.com/phpmyadmin/phpmyadmin/commit/cd229d718e8cb4bc8ba32446beaa82d27727b6f0
- https://github.com/phpmyadmin/phpmyadmin/commit/cd229d718e8cb4bc8ba32446beaa82d27727b6f0
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-23/
- https://www.phpmyadmin.net/security/PMASA-2016-23/
Modified: 2024-11-21
CVE-2016-5731
Cross-site scripting (XSS) vulnerability in examples/openid.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via vectors involving an OpenID error message.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- DSA-3627
- DSA-3627
- https://github.com/phpmyadmin/phpmyadmin/commit/418aeea3d83b0b6021bac311d849570acfc6e48c
- https://github.com/phpmyadmin/phpmyadmin/commit/418aeea3d83b0b6021bac311d849570acfc6e48c
- https://github.com/phpmyadmin/phpmyadmin/commit/94cf3864254ffaf3a69e97d8fc454888368b94ab
- https://github.com/phpmyadmin/phpmyadmin/commit/94cf3864254ffaf3a69e97d8fc454888368b94ab
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-24/
- https://www.phpmyadmin.net/security/PMASA-2016-24/
Modified: 2024-11-21
CVE-2016-5733
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) a crafted table name that is mishandled during privilege checking in table_row.phtml, (2) a crafted mysqld log_bin directive that is mishandled in log_selector.phtml, (3) the Transformation implementation, (4) AJAX error handling in js/ajax.js, (5) the Designer implementation, (6) the charts implementation in js/tbl_chart.js, or (7) the zoom-search implementation in rows_zoom.phtml.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- DSA-3627
- DSA-3627
- 91390
- 91390
- https://github.com/phpmyadmin/phpmyadmin/commit/4d21b5c077db50c2a54b7f569d20f463cc2651f5
- https://github.com/phpmyadmin/phpmyadmin/commit/4d21b5c077db50c2a54b7f569d20f463cc2651f5
- https://github.com/phpmyadmin/phpmyadmin/commit/615212a14d7d87712202f37354acf8581987fc5a
- https://github.com/phpmyadmin/phpmyadmin/commit/615212a14d7d87712202f37354acf8581987fc5a
- https://github.com/phpmyadmin/phpmyadmin/commit/79661610f6f65443e0ec1e382a7240437f28436c
- https://github.com/phpmyadmin/phpmyadmin/commit/79661610f6f65443e0ec1e382a7240437f28436c
- https://github.com/phpmyadmin/phpmyadmin/commit/8716855b309dbe65d7b9a5d681b80579b225b322
- https://github.com/phpmyadmin/phpmyadmin/commit/8716855b309dbe65d7b9a5d681b80579b225b322
- https://github.com/phpmyadmin/phpmyadmin/commit/895a131d2eb7e447757a35d5731c7d647823ea8b
- https://github.com/phpmyadmin/phpmyadmin/commit/895a131d2eb7e447757a35d5731c7d647823ea8b
- https://github.com/phpmyadmin/phpmyadmin/commit/960fd1fd52023047a23d069178bfff7463c2cefc
- https://github.com/phpmyadmin/phpmyadmin/commit/960fd1fd52023047a23d069178bfff7463c2cefc
- https://github.com/phpmyadmin/phpmyadmin/commit/be3ecbb4cca3fbe20e3b3aa4e049902d18b60865
- https://github.com/phpmyadmin/phpmyadmin/commit/be3ecbb4cca3fbe20e3b3aa4e049902d18b60865
- https://github.com/phpmyadmin/phpmyadmin/commit/d648ade18d6cbb796a93261491c121f078df2d88
- https://github.com/phpmyadmin/phpmyadmin/commit/d648ade18d6cbb796a93261491c121f078df2d88
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-26/
- https://www.phpmyadmin.net/security/PMASA-2016-26/
Modified: 2024-11-21
CVE-2016-5734
phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.
- 91387
- 91387
- https://github.com/phpmyadmin/phpmyadmin/commit/1cc7466db3a05e95fe57a6702f41773e6829d54b
- https://github.com/phpmyadmin/phpmyadmin/commit/1cc7466db3a05e95fe57a6702f41773e6829d54b
- https://github.com/phpmyadmin/phpmyadmin/commit/4bcc606225f15bac0b07780e74f667f6ac283da7
- https://github.com/phpmyadmin/phpmyadmin/commit/4bcc606225f15bac0b07780e74f667f6ac283da7
- GLSA-201701-32
- GLSA-201701-32
- 40185
- 40185
- https://www.phpmyadmin.net/security/PMASA-2016-27/
- https://www.phpmyadmin.net/security/PMASA-2016-27/
Modified: 2024-11-21
CVE-2016-5739
The Transformation implementation in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not use the no-referrer Content Security Policy (CSP) protection mechanism, which makes it easier for remote attackers to conduct CSRF attacks by reading an authentication token in a Referer header, related to libraries/Header.php.
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1699
- openSUSE-SU-2016:1700
- openSUSE-SU-2016:1700
- DSA-3627
- DSA-3627
- 91389
- 91389
- https://github.com/phpmyadmin/phpmyadmin/commit/1e5716cb96d46efc305381ae0da08e73fe340f05
- https://github.com/phpmyadmin/phpmyadmin/commit/1e5716cb96d46efc305381ae0da08e73fe340f05
- https://github.com/phpmyadmin/phpmyadmin/commit/2f4950828ec241e8cbdcf13090c2582a6fa620cb
- https://github.com/phpmyadmin/phpmyadmin/commit/2f4950828ec241e8cbdcf13090c2582a6fa620cb
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-28/
- https://www.phpmyadmin.net/security/PMASA-2016-28/
Modified: 2024-11-21
CVE-2016-6606
An issue was discovered in cookie encryption in phpMyAdmin. The decryption of the username/password is vulnerable to a padding oracle attack. This can allow an attacker who has access to a user's browser cookie file to decrypt the username and password. Furthermore, the same initialization vector (IV) is used to hash the username and password stored in the phpMyAdmin cookie. If a user has the same password as their username, an attacker who examines the browser cookie can see that they are the same - but the attacker can not directly decode these values from the cookie as it is still hashed. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94114
- 94114
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-29
- https://www.phpmyadmin.net/security/PMASA-2016-29
Modified: 2024-11-21
CVE-2016-6607
XSS issues were discovered in phpMyAdmin. This affects Zoom search (specially crafted column content can be used to trigger an XSS attack); GIS editor (certain fields in the graphical GIS editor are not properly escaped and can be used to trigger an XSS attack); Relation view; the following Transformations: Formatted, Imagelink, JPEG: Upload, RegexValidation, JPEG inline, PNG inline, and transformation wrapper; XML export; MediaWiki export; Designer; When the MySQL server is running with a specially-crafted log_bin directive; Database tab; Replication feature; and Database search. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 93257
- 93257
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-30
- https://www.phpmyadmin.net/security/PMASA-2016-30
Modified: 2024-11-21
CVE-2016-6609
An issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94112
- 94112
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-32
- https://www.phpmyadmin.net/security/PMASA-2016-32
Modified: 2024-11-21
CVE-2016-6610
A full path disclosure vulnerability was discovered in phpMyAdmin where a user can trigger a particular error in the export mechanism to discover the full path of phpMyAdmin on the disk. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Modified: 2024-11-21
CVE-2016-6611
An issue was discovered in phpMyAdmin. A specially crafted database and/or table name can be used to trigger an SQL injection attack through the export functionality. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94117
- 94117
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-34
- https://www.phpmyadmin.net/security/PMASA-2016-34
Modified: 2024-11-21
CVE-2016-6612
An issue was discovered in phpMyAdmin. A user can exploit the LOAD LOCAL INFILE functionality to expose files on the server to the database system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94113
- 94113
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-35
- https://www.phpmyadmin.net/security/PMASA-2016-35
Modified: 2024-11-21
CVE-2016-6613
An issue was discovered in phpMyAdmin. A user can specially craft a symlink on disk, to a file which phpMyAdmin is permitted to read but the user is not, which phpMyAdmin will then expose to the user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94115
- 94115
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-36
- https://www.phpmyadmin.net/security/PMASA-2016-36
Modified: 2024-11-21
CVE-2016-6614
An issue was discovered in phpMyAdmin involving the %u username replacement functionality of the SaveDir and UploadDir features. When the username substitution is configured, a specially-crafted user name can be used to circumvent restrictions to traverse the file system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 94366
- 94366
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-37
- https://www.phpmyadmin.net/security/PMASA-2016-37
Modified: 2024-11-21
CVE-2016-6618
An issue was discovered in phpMyAdmin. The transformation feature allows a user to trigger a denial-of-service (DoS) attack against the server. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 95047
- 95047
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-41
- https://www.phpmyadmin.net/security/PMASA-2016-41
Modified: 2024-11-21
CVE-2016-6619
An issue was discovered in phpMyAdmin. In the user interface preference feature, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 95048
- 95048
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-42
- https://www.phpmyadmin.net/security/PMASA-2016-42
Modified: 2024-11-21
CVE-2016-6620
An issue was discovered in phpMyAdmin. Some data is passed to the PHP unserialize() function without verification that it's valid serialized data. The unserialization can result in code execution because of the interaction with object instantiation and autoloading. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 95055
- 95055
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-43
- https://www.phpmyadmin.net/security/PMASA-2016-43
Modified: 2024-11-21
CVE-2016-6621
The setup script for phpMyAdmin before 4.0.10.19, 4.4.x before 4.4.15.10, and 4.6.x before 4.6.6 allows remote attackers to conduct server-side request forgery (SSRF) attacks via unspecified vectors.
Modified: 2024-11-21
CVE-2016-6622
An issue was discovered in phpMyAdmin. An unauthenticated user is able to execute a denial-of-service (DoS) attack by forcing persistent connections when phpMyAdmin is running with $cfg['AllowArbitraryServer']=true. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 95049
- 95049
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-45
- https://www.phpmyadmin.net/security/PMASA-2016-45
Modified: 2024-11-21
CVE-2016-6623
An issue was discovered in phpMyAdmin. An authorized user can cause a denial-of-service (DoS) attack on a server by passing large values to a loop. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Modified: 2024-11-21
CVE-2016-6624
An issue was discovered in phpMyAdmin involving improper enforcement of the IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server environment, and the proxy server is in the allowed range but the attacking computer is not allowed, this vulnerability can allow the attacking computer to connect despite the IP rules. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92489
- 92489
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-47
- https://www.phpmyadmin.net/security/PMASA-2016-47
Modified: 2024-11-21
CVE-2016-6625
An issue was discovered in phpMyAdmin. An attacker can determine whether a user is logged in to phpMyAdmin. The user's session, username, and password are not compromised by this vulnerability. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Modified: 2024-11-21
CVE-2016-6626
An issue was discovered in phpMyAdmin. An attacker could redirect a user to a malicious web page. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92490
- 92490
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-49
- https://www.phpmyadmin.net/security/PMASA-2016-49
Modified: 2024-11-21
CVE-2016-6627
An issue was discovered in phpMyAdmin. An attacker can determine the phpMyAdmin host location through the file url.php. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92494
- 92494
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-50
- https://www.phpmyadmin.net/security/PMASA-2016-50
Modified: 2024-11-21
CVE-2016-6628
An issue was discovered in phpMyAdmin. An attacker may be able to trigger a user to download a specially crafted malicious SVG file. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92492
- 92492
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-51
- https://www.phpmyadmin.net/security/PMASA-2016-51
Modified: 2024-11-21
CVE-2016-6629
An issue was discovered in phpMyAdmin involving the $cfg['ArbitraryServerRegexp'] configuration directive. An attacker could reuse certain cookie values in a way of bypassing the servers defined by ArbitraryServerRegexp. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Modified: 2024-11-21
CVE-2016-6630
An issue was discovered in phpMyAdmin. An authenticated user can trigger a denial-of-service (DoS) attack by entering a very long password at the change password dialog. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92501
- 92501
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-53
- https://www.phpmyadmin.net/security/PMASA-2016-53
Modified: 2024-11-21
CVE-2016-6631
An issue was discovered in phpMyAdmin. A user can execute a remote code execution attack against a server when phpMyAdmin is being run as a CGI application. Under certain server configurations, a user can pass a query string which is executed as a command-line argument by the file generator_plugin.sh. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92496
- 92496
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-54
- https://www.phpmyadmin.net/security/PMASA-2016-54
Modified: 2024-11-21
CVE-2016-6632
An issue was discovered in phpMyAdmin where, under certain conditions, phpMyAdmin may not delete temporary files during the import of ESRI files. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
- 92497
- 92497
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-55
- https://www.phpmyadmin.net/security/PMASA-2016-55
Modified: 2024-11-21
CVE-2016-6633
An issue was discovered in phpMyAdmin. phpMyAdmin can be used to trigger a remote code execution attack against certain PHP installations that are running with the dbase extension. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
Modified: 2024-11-21
CVE-2016-9847
An issue was discovered in phpMyAdmin. When the user does not specify a blowfish_secret key for encrypting cookies, phpMyAdmin generates one at runtime. A vulnerability was reported where the way this value is created uses a weak algorithm. This could allow an attacker to determine the user's blowfish_secret and potentially decrypt their cookies. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9848
An issue was discovered in phpMyAdmin. phpinfo (phpinfo.php) shows PHP information including values of HttpOnly cookies. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9849
An issue was discovered in phpMyAdmin. It is possible to bypass AllowRoot restriction ($cfg['Servers'][$i]['AllowRoot']) and deny rules for username by using Null Byte in the username. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
- 94521
- 94521
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-60
- https://www.phpmyadmin.net/security/PMASA-2016-60
Modified: 2024-11-21
CVE-2016-9850
An issue was discovered in phpMyAdmin. Username matching for the allow/deny rules may result in wrong matches and detection of the username in the rule due to non-constant execution time. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
- 94529
- 94529
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-61
- https://www.phpmyadmin.net/security/PMASA-2016-61
Modified: 2024-11-21
CVE-2016-9856
An XSS issue was discovered in phpMyAdmin because of an improper fix for CVE-2016-2559 in PMASA-2016-10. This issue is resolved by using a copy of a hash to avoid a race condition. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9857
An issue was discovered in phpMyAdmin. XSS is possible because of a weakness in a regular expression used in some JavaScript processing. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9858
An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to initiate a denial of service attack in saved searches feature. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9859
An issue was discovered in phpMyAdmin. With a crafted request parameter value it is possible to initiate a denial of service attack in import feature. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9860
An issue was discovered in phpMyAdmin. An unauthenticated user can execute a denial of service attack when phpMyAdmin is running with $cfg['AllowArbitraryServer']=true. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2016-9861
An issue was discovered in phpMyAdmin. Due to the limitation in URL matching, it was possible to bypass the URL white-list protection. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
- 94535
- 94535
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-66
- https://www.phpmyadmin.net/security/PMASA-2016-66
Modified: 2024-11-21
CVE-2016-9864
An issue was discovered in phpMyAdmin. With a crafted username or a table name, it was possible to inject SQL statements in the tracking functionality that would run with the privileges of the control user. This gives read and write access to the tables of the configuration storage database, and if the control user has the necessary privileges, read access to some tables of the MySQL database. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
- 94533
- 94533
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-69
- https://www.phpmyadmin.net/security/PMASA-2016-69
Modified: 2024-11-21
CVE-2016-9865
An issue was discovered in phpMyAdmin. Due to a bug in serialized string parsing, it was possible to bypass the protection offered by PMA_safeUnserialize() function. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
- 94531
- 94531
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- [debian-lts-announce] 20180706 [SECURITY] [DLA 1415-1] phpmyadmin security update
- GLSA-201701-32
- GLSA-201701-32
- https://www.phpmyadmin.net/security/PMASA-2016-70
- https://www.phpmyadmin.net/security/PMASA-2016-70
Modified: 2024-11-21
CVE-2016-9866
An issue was discovered in phpMyAdmin. When the arg_separator is different from its default & value, the CSRF token was not properly stripped from the return URL of the preference import action. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
Modified: 2024-11-21
CVE-2017-1000013
phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to an open redirect weakness
Modified: 2024-11-21
CVE-2017-1000014
phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a DOS weakness in the table editing functionality
Modified: 2024-11-21
CVE-2017-1000015
phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a CSS injection attack through crafted cookie parameters
Modified: 2024-11-21
CVE-2017-1000017
phpMyAdmin 4.0, 4.4 and 4.6 are vulnerable to a weakness where a user with appropriate permissions is able to connect to an arbitrary MySQL server
Modified: 2024-11-21
CVE-2017-1000018
phpMyAdmin 4.0, 4.4., and 4.6 are vulnerable to a DOS attack in the replication status by using a specially crafted table name
Modified: 2024-11-21
CVE-2017-18264
An issue was discovered in libraries/common.inc.php in phpMyAdmin 4.0 before 4.0.10.20, 4.4.x, 4.6.x, and 4.7.0 prereleases. The restrictions caused by $cfg['Servers'][$i]['AllowNoPassword'] = false are bypassed under certain PHP versions (e.g., version 5). This can allow the login of users who have no password set even if the administrator has set $cfg['Servers'][$i]['AllowNoPassword'] to false (which is also the default). This occurs because some implementations of the PHP substr function return false when given '' as the first argument.
Package kernel-image-std-def updated to version 3.12.19-alt2 for branch p7 in task 119379.
Closed vulnerabilities
BDU:2014-00109
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2014-00333
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2014-0196
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- SUSE-SU-2014:0667
- SUSE-SU-2014:0667
- SUSE-SU-2014:0683
- SUSE-SU-2014:0683
- http://pastebin.com/raw.php?i=yTSFUBgZ
- http://pastebin.com/raw.php?i=yTSFUBgZ
- RHSA-2014:0512
- RHSA-2014:0512
- 59218
- 59218
- 59262
- 59262
- 59599
- 59599
- http://source.android.com/security/bulletin/2016-07-01.html
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- DSA-2926
- DSA-2926
- DSA-2928
- DSA-2928
- 33516
- 33516
- [oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption
- [oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption
- 106646
- 106646
- USN-2196-1
- USN-2196-1
- USN-2197-1
- USN-2197-1
- USN-2198-1
- USN-2198-1
- USN-2199-1
- USN-2199-1
- USN-2200-1
- USN-2200-1
- USN-2201-1
- USN-2201-1
- USN-2202-1
- USN-2202-1
- USN-2203-1
- USN-2203-1
- USN-2204-1
- USN-2204-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
Package kernel-image-std-pae updated to version 3.12.19-alt2 for branch p7 in task 119379.
Closed vulnerabilities
BDU:2014-00109
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
BDU:2014-00333
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2014-0196
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- SUSE-SU-2014:0667
- SUSE-SU-2014:0667
- SUSE-SU-2014:0683
- SUSE-SU-2014:0683
- http://pastebin.com/raw.php?i=yTSFUBgZ
- http://pastebin.com/raw.php?i=yTSFUBgZ
- RHSA-2014:0512
- RHSA-2014:0512
- 59218
- 59218
- 59262
- 59262
- 59599
- 59599
- http://source.android.com/security/bulletin/2016-07-01.html
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- DSA-2926
- DSA-2926
- DSA-2928
- DSA-2928
- 33516
- 33516
- [oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption
- [oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption
- 106646
- 106646
- USN-2196-1
- USN-2196-1
- USN-2197-1
- USN-2197-1
- USN-2198-1
- USN-2198-1
- USN-2199-1
- USN-2199-1
- USN-2200-1
- USN-2200-1
- USN-2201-1
- USN-2201-1
- USN-2202-1
- USN-2202-1
- USN-2203-1
- USN-2203-1
- USN-2204-1
- USN-2204-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00