Change logs for phpmyadmin source package in Zesty

  • phpmyadmin (4:4.6.6-4) unstable; urgency=medium
    
      * Build depend on locales-all to ensure en_US.UTF-8 is available (see
        #859219).
    
     -- Michal Čihař <email address hidden>  Fri, 07 Apr 2017 16:54:26 +0200
  • phpmyadmin (4:4.6.6-3) unstable; urgency=medium
    
      * Set locales for tests to avoid problems with transliteration in glibc for
        C.UTF-8 (Closes: #859219).
    
     -- Michal Čihař <email address hidden>  Tue, 04 Apr 2017 15:19:53 +0200
  • phpmyadmin (4:4.6.6-2) unstable; urgency=high
    
      * Apply upstream patch to fix not working
        $cfg['Servers'][$i]['AllowNoPassword'] (PMASA-2017-8).
    
     -- Michal Čihař <email address hidden>  Thu, 30 Mar 2017 14:40:46 +0200
  • phpmyadmin (4:4.6.6-1) unstable; urgency=medium
    
      * New upstream release.
        - Multiple vulnerabilities in setup script (PMASA-2016-44).
        - Open redirect (PMASA-2017-1).
        - php-gettext code execution (PMASA-2017-2, CVE-2015-8980).
        - DOS vulnerabiltiy in table editing (PMASA-2017-3).
        - CSS injection in themes (PMASA-2017-4).
        - Cookie attribute injection attack (PMASA-2017-5).
        - SSRF in replication (PMASA-2017-6).
        - DOS in replication status (PMASA-2017-7).
    
     -- Michal Čihař <email address hidden>  Tue, 24 Jan 2017 09:14:39 +0100
  • phpmyadmin (4:4.6.5.2-1) unstable; urgency=medium
    
      * New upstream release.
      * Remove allow_url_fopen setting, recommend php-curl as that's better way to
        support ReCaptcha or similar plugins.
      * Simplify dependency on php-gettext.
      * Properly work with both php-gettext and php-php-gettext packages as each
        of them installs library to different path.
      * Run testsuite during build, this includes dozen of upstream fixes for it.
    
     -- Michal Čihař <email address hidden>  Tue, 06 Dec 2016 10:48:29 +0100
  • phpmyadmin (4:4.6.5.1-1) unstable; urgency=high
    
      * New upstream release, fixing several security issues:
        - Unsafe generation of $cfg['blowfish_secret']
          (PMASA-2016-58)
        - phpMyAdmin's phpinfo functionality is removed
          (PMASA-2016-59)
        - AllowRoot and allow/deny rule bypass with specially-crafted username
          (PMASA-2016-60)
        - Username matching weaknesses with allow/deny rules
          (PMASA-2016-61)
        - Possible to bypass logout timeout
          (PMASA-2016-62)
        - Full path disclosure (FPD) weaknesses
          (PMASA-2016-63)
        - Multiple XSS weaknesses
          (PMASA-2016-64)
        - Multiple denial-of-service (DOS) vulnerabilities
          (PMASA-2016-65)
        - Possible to bypass white-list protection for URL redirection
          (PMASA-2016-66)
        - BBCode injection to login page
          (PMASA-2016-67)
        - Denial-of-service (DOS) vulnerability in table partitioning
          (PMASA-2016-68)
        - Multiple SQL injection vulnerabilities
          (PMASA-2016-69)
        - Incorrect serialized string parsing
          (PMASA-2016-70)
        - CSRF token not stripped from the URL
          (PMASA-2016-71)
    
     -- Michal Čihař <email address hidden>  Mon, 28 Nov 2016 10:22:19 +0100
  • phpmyadmin (4:4.6.4+dfsg1-2) unstable; urgency=medium
    
      * Change suggests to prefer default-mysql-server.
      * Depend on php-php-gettext as the package has been renamed
        (Closes: #837507).
      * Deny direct access to template files.
      * Use HTTPS in the Vcs-* fields, and use the cgit frontend instead of
        gitweb
      * Use current email address in debian/doc-base and debian/copyright.
      * Remove obsolete PHP settings from Apache configuration.
      * Disable mbstring.func_overload in Apache configuration.
      * Added Korean debconf translation.
      * Updated Polish debconf translation.
      * Fix path to php-gettext library (Closes: #839923).
    
     -- Michal Čihař <email address hidden>  Fri, 18 Nov 2016 18:14:21 +0100
  • phpmyadmin (4:4.6.4+dfsg1-1) unstable; urgency=high
    
      * Repacked sources to exclude non free sRGB profile.
      * Replace FollowSymLinks with SymLinksIfOwnerMatch to apache configuration.
      * Updated Chinese debconf translations.
      * Better generate blowfish_secret.
      * New upstream release, fixing several security issues:
        - Weaknesses with cookie encryption
          (PMASA-2016-29, CVE-2016-6606)
        - Multiple XSS vulnerabilities
          (PMASA-2016-30, CVE-2016-6607)
        - Multiple XSS vulnerabilities
          (PMASA-2016-31, CVE-2016-6608)
        - PHP code injection
          (PMASA-2016-32, CVE-2016-6609)
        - Full path disclosure
          (PMASA-2016-33, CVE-2016-6610)
        - SQL injection attack
          (PMASA-2016-34, CVE-2016-6611)
        - Local file exposure through LOAD DATA LOCAL INFILE
          (PMASA-2016-35, CVE-2016-6612)
        - Local file exposure through symlinks with UploadDir
          (PMASA-2016-36, CVE-2016-6613)
        - Path traversal with SaveDir and UploadDir
          (PMASA-2016-37, CVE-2016-6614)
        - Multiple XSS vulnerabilities
          (PMASA-2016-38, CVE-2016-6615)
        - SQL injection vulnerability as control user
          (PMASA-2016-39, CVE-2016-6616)
        - SQL injection vulnerability
          (PMASA-2016-40, CVE-2016-6617)
        - Denial-of-service attack through transformation feature
          (PMASA-2016-41, CVE-2016-6618)
        - SQL injection vulnerability as control user
          (PMASA-2016-42, CVE-2016-6619)
        - Verify data before unserializing
          (PMASA-2016-43, CVE-2016-6620)
        - SSRF in setup script
          (PMASA-2016-44, CVE-2016-6621)
        - Denial-of-service attack with $cfg['AllowArbitraryServer'] = true and
        persistent connections
          (PMASA-2016-45, CVE-2016-6622)
        - Denial-of-service attack by using for loops
          (PMASA-2016-46, CVE-2016-6623)
        - Possible circumvention of IP-based allow/deny rules with IPv6 and proxy
        server
          (PMASA-2016-47, CVE-2016-6624)
        - Detect if user is logged in
          (PMASA-2016-48, CVE-2016-6625)
        - Bypass URL redirection protection
          (PMASA-2016-49, CVE-2016-6626)
        - Referrer leak
          (PMASA-2016-50, CVE-2016-6627)
        - Reflected File Download
          (PMASA-2016-51, CVE-2016-6628)
        - ArbitraryServerRegexp bypass
          (PMASA-2016-52, CVE-2016-6629)
        - Denial-of-service attack by entering long password
          (PMASA-2016-53, CVE-2016-6630)
        - Remote code execution vulnerability when running as CGI
          (PMASA-2016-54, CVE-2016-6631)
        - Denial-of-service attack when PHP uses dbase extension
          (PMASA-2016-55, CVE-2016-6632)
        - Remove tode execution vulnerability when PHP uses dbase extension
          (PMASA-2016-56, CVE-2016-6633)
    
     -- Michal Čihař <email address hidden>  Wed, 17 Aug 2016 10:05:21 +0200