ALT-BU-2018-3321-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-1010057
nfdump 1.6.16 and earlier is affected by: Buffer Overflow. The impact is: The impact could range from a denial of service to local code execution. The component is: nfx.c:546, nffile_inline.c:83, minilzo.c (redistributed). The attack vector is: nfdump must read and process a specially crafted file. The fixed version is: after commit 9f0fe9563366f62a71d34c92229da3432ec5cf0e.
- https://github.com/phaag/nfdump/issues/104
- https://github.com/phaag/nfdump/issues/104
- [debian-lts-announce] 20200926 [SECURITY] [DLA 2383-1] nfdump security update
- [debian-lts-announce] 20200926 [SECURITY] [DLA 2383-1] nfdump security update
- FEDORA-2019-0fbfb00cbb
- FEDORA-2019-0fbfb00cbb
- FEDORA-2019-9013b5e75d
- FEDORA-2019-9013b5e75d
- GLSA-202003-17
- GLSA-202003-17
Package phpMyAdmin updated to version 4.8.2-alt1 for branch sisyphus in task 208858.
Closed vulnerabilities
BDU:2018-01545
Уязвимость веб-приложения для администрирования cистем управления базами данных phpMyAdmin, связанная с недостатками процедуры аутентификации, позволяющая нарушителю просматривать и выполнять файлы на сервере
Modified: 2024-11-21
CVE-2018-12581
An issue was discovered in js/designer/move.js in phpMyAdmin before 4.8.2. A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted database name to trigger an XSS attack when that database is referenced from the Designer feature.
Modified: 2024-11-21
CVE-2018-12613
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
- http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/164623/phpMyAdmin-4.8.1-Remote-Code-Execution.html
- 104532
- 104532
- GLSA-201904-16
- GLSA-201904-16
- 44924
- 44924
- 44928
- 44928
- 45020
- 45020
- https://www.phpmyadmin.net/security/PMASA-2018-4/
- https://www.phpmyadmin.net/security/PMASA-2018-4/
Closed bugs
недостающие зависимости