First published: Tue Sep 16 2008(Updated: )
Description of problem: phpMyAdmin < 2.11.9.1 contains a not yet clearly documented security bug: "Welcome to this security update for phpMyAdmin 2.11.9. Details will follow on <a href="http://phpmyadmin.net">http://phpmyadmin.net</a>. Marc Delisle, for the team" Additional info (<a href="http://www.phpmyadmin.net/home_page/downloads.php?relnotes=0">http://www.phpmyadmin.net/home_page/downloads.php?relnotes=0</a>): Fixes for 2.11.9.x: - <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - zimg for EPEL 9" href="show_bug.cgi?id=2031221">bug #2031221</a> [auth] Links to version number on login screen - <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED RAWHIDE - [F36FTBFS]: anope fails to build from source in Fedora Rawhide with openldap-2.6" href="show_bug.cgi?id=2032707">bug #2032707</a> [core] PMA does not start if ini_set() is disabled - <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED CURRENTRELEASE - openssl occasionally sends internal error to gnutls when using FFDHE" href="show_bug.cgi?id=2004915">bug #2004915</a> [bookmarks] Saved queries greater than 1000 chars not displayed - <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=2037381">bug #2037381</a> [export] Export type "replace" does not work - <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=2037375">bug #2037375</a> [export] DROP PROCEDURE needs IF EXISTS - <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED EOL - golang-github-golangci-lint-1: FTBFS in Fedora rawhide/f36" href="show_bug.cgi?id=2045512">bug #2045512</a> [export] Numbers in Excel export + [lang] Norwegian UTF-8 original file remerged - <a class="bz_bug_link bz_status_NEW bz_public " title="NEW - CVE-2022-27191 rclone: golang: crash in a golang.org/x/crypto/ssh server [epel-all]" href="show_bug.cgi?id=2074250">bug #2074250</a> [parser] Undefined variable seen_from - (2.11.9.1) [security] Code execution vulnerability
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
phpMyAdmin phpMyAdmin | =2.10.3rc1 | |
phpMyAdmin phpMyAdmin | =2.11.4 | |
phpMyAdmin phpMyAdmin | =2.1.1 | |
phpMyAdmin phpMyAdmin | =2.11.0rc1 | |
phpMyAdmin phpMyAdmin | =2.11.1.2 | |
phpMyAdmin phpMyAdmin | =2.1.2 | |
phpMyAdmin phpMyAdmin | <=2.11.9 | |
phpMyAdmin phpMyAdmin | =2.11.5.1 | |
phpMyAdmin phpMyAdmin | =2.11.3rc1 | |
phpMyAdmin phpMyAdmin | =2.11.1 | |
phpMyAdmin phpMyAdmin | =2.11.5.0 | |
phpMyAdmin phpMyAdmin | =2.10.0.1 | |
phpMyAdmin phpMyAdmin | =2.11.6rc1 | |
phpMyAdmin phpMyAdmin | =2.0.4 | |
phpMyAdmin phpMyAdmin | =2.10.2 | |
phpMyAdmin phpMyAdmin | =2.11.1rc1 | |
phpMyAdmin phpMyAdmin | =2.0.2 | |
phpMyAdmin phpMyAdmin | =2.10.0.2 | |
phpMyAdmin phpMyAdmin | =2.10.3 | |
phpMyAdmin phpMyAdmin | =2.11.2 | |
phpMyAdmin phpMyAdmin | =2.11.7 | |
phpMyAdmin phpMyAdmin | =2.0.3 | |
phpMyAdmin phpMyAdmin | =2.11.5 | |
phpMyAdmin phpMyAdmin | =2.11.5.2 | |
phpMyAdmin phpMyAdmin | =2.11.2.2 | |
phpMyAdmin phpMyAdmin | =2.11.4rc1 | |
phpMyAdmin phpMyAdmin | =2.11.5rc1 | |
phpMyAdmin phpMyAdmin | =2.1.0 | |
phpMyAdmin phpMyAdmin | =2.11.8 | |
phpMyAdmin phpMyAdmin | =2.1 | |
phpMyAdmin phpMyAdmin | =2.11.4.0 | |
phpMyAdmin phpMyAdmin | =2.0.1 | |
phpMyAdmin phpMyAdmin | =2.11.3 | |
phpMyAdmin phpMyAdmin | =2.11.2.1 | |
phpMyAdmin phpMyAdmin | =2.10.1 | |
phpMyAdmin phpMyAdmin | =2.10.0.0 | |
phpMyAdmin phpMyAdmin | =2.11.2.0 | |
phpMyAdmin phpMyAdmin | =2.11.1.1 | |
phpMyAdmin phpMyAdmin | =2.11.6 | |
phpMyAdmin phpMyAdmin | =2.10.01 | |
phpMyAdmin phpMyAdmin | =2.11.0beta1 | |
phpMyAdmin phpMyAdmin | =2.0.0 | |
phpMyAdmin phpMyAdmin | =2.10.0 | |
phpMyAdmin phpMyAdmin | =2.10.3.0 | |
phpMyAdmin phpMyAdmin | =2.11.3.0 | |
phpMyAdmin phpMyAdmin | =2.11.0.0 | |
phpMyAdmin phpMyAdmin | =2.10.2.0 | |
phpMyAdmin phpMyAdmin | =2.0 | |
phpMyAdmin phpMyAdmin | =2.11.1.0 | |
phpMyAdmin phpMyAdmin | =2.10.1.0 | |
phpMyAdmin phpMyAdmin | =2.11.0 | |
phpMyAdmin phpMyAdmin | =2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.