CVE-2015-7873: Content spoofing vulnerability when redirecting user to an external site

Bug #1510521 reported by Julian Ladisch
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
phpmyadmin (Ubuntu)
Expired
Undecided
Unassigned

Bug Description

https://www.phpmyadmin.net/security/PMASA-2015-5/

"Affected Versions
Versions 4.4.x (prior to 4.4.15.1) and 4.5.x (prior to 4.5.1) are affected."

"Solution
Upgrade to phpMyAdmin 4.4.15.1 or newer, or 4.5.1 or newer".

Ubuntu
Xenial phpmyadmin_4.5.1-1_all.deb - fixed
Wily phpmyadmin_4.4.13.1-1_all.deb - affected
Vivid phpmyadmin_4.2.12-2_all.deb - affected
Trusty phpmyadmin_4.0.10-1_all.deb
Precise phpmyadmin_3.4.10.1-1_all.deb

Related branches

CVE References

information type: Private Security → Public Security
Revision history for this message
Marc Deslauriers (mdeslaur) wrote :

Thank you for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. I see that you have attached patches to update the Ubuntu packages to the new upstream version. While this work is appreciated, we cannot publish your patches because this does not follow Ubuntu's policy of backporting security patches. If you are able, perhaps you could prepare debdiffs to fix this by following https://wiki.ubuntu.com/SecurityUpdateProcedures.

Changed in phpmyadmin (Ubuntu):
status: New → Incomplete
Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for phpmyadmin (Ubuntu) because there has been no activity for 60 days.]

Changed in phpmyadmin (Ubuntu):
status: Incomplete → Expired
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.