CVE-2022-23807 (https://www.phpmyadmin.net/security/PMASA-2022-1/): An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances. CVE-2022-23808 (https://www.phpmyadmin.net/security/PMASA-2022-2/): An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection. Please bump to 5.1.2.
I guess this is fixed by 5.2.0. Please stabilize when ready.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=2a6a6195effdbec2c1f532eecad3fe71046b0348 commit 2a6a6195effdbec2c1f532eecad3fe71046b0348 Author: Miroslav Šulc <fordfrog@gentoo.org> AuthorDate: 2022-08-17 06:13:05 +0000 Commit: Miroslav Šulc <fordfrog@gentoo.org> CommitDate: 2022-08-17 06:13:05 +0000 dev-db/phpmyadmin: dropped obsolete 5.1.1 Bug: https://bugs.gentoo.org/865459 Bug: https://bugs.gentoo.org/835071 Bug: https://bugs.gentoo.org/831841 Signed-off-by: Miroslav Šulc <fordfrog@gentoo.org> dev-db/phpmyadmin/Manifest | 1 - dev-db/phpmyadmin/phpmyadmin-5.1.1.ebuild | 61 ------------------------------- 2 files changed, 62 deletions(-)
the tree is clean now, you can proceed.
Thanks!
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=17b5b8836331281e84f8ed624b689a3d52cac6fe commit 17b5b8836331281e84f8ed624b689a3d52cac6fe Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2023-11-26 10:46:10 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2023-11-26 10:46:39 +0000 [ GLSA 202311-17 ] phpMyAdmin: Multiple Vulnerabilities Bug: https://bugs.gentoo.org/831841 Bug: https://bugs.gentoo.org/835071 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org> glsa-202311-17.xml | 45 +++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+)