http://bugzilla.suse.com/show_bug.cgi?id=994313
http://bugzilla.suse.com/show_bug.cgi?id=994313#c14
--- Comment #14 from Marcus Meissner ---
https://www.phpmyadmin.net/security/PMASA-2016-43/
PMASA-2016-43
Announcement-ID: PMASA-2016-43
Date: 2016-07-15
Summary
Unvalidated data passed to unserialize()
Description
A vulnerability was reported where some data is passed to the PHP unserialize()
function without verification that it's valid serialized data.
Due to how the PHP function operates,
Unserialization can result in code being loaded and executed due to object
instantiation and autoloading, and a malicious user may be able to exploit
this.
Therefore, a malicious user may be able to manipulate the stored data in a way
to exploit this weakness.
Severity
We consider this vulnerability to be moderately severe.
Affected Versions
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and
4.0.x versions (prior to 4.0.10.17) are affected
Solution
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply patch
listed below.
References
Thanks to Emanuel Bronshtein @e3amn2l for reporting this vulnerability.
Assigned CVE ids: CVE-2016-6620
CWE ids: CWE-661
Patches
The following commits have been made on the 4.0 branch to fix this issue:
80c9302
The following commits have been made on the 4.4 branch to fix this issue:
2104fb6
The following commits have been made on the 4.6 branch to fix this issue:
ba072e4
--
You are receiving this mail because:
You are on the CC list for the bug.