summaryrefslogtreecommitdiffstats
path: root/meta-webserver/recipes-php/phpmyadmin/phpmyadmin_4.2.7.bb
Commit message (Collapse)AuthorAgeFilesLines
* phpmyadmin: update to 4.3.4Paul Eggleton2015-01-081-37/+0
| | | | | | Drop patches merged upstream. Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
* phpmyadmin: don't install patchesWenzong Fan2014-12-191-0/+2
| | | | | | | Don't install local patch files to target. Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* phpmyadmin: fix for Security Advisory CVE-2014-7217Roy Li2014-10-311-0/+1
| | | | | | | | | | | | | Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.4, 4.1.x before 4.1.14.5, and 4.2.x before 4.2.9.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted ENUM value that is improperly handled during rendering of the (1) table search or (2) table structure page, related to libraries/TableSearch.class.php and libraries/Util.class.php. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7217 Signed-off-by: Roy Li <rongqing.li@windriver.com>
* phpmyadmin: fix for Security Advisory CVE-2014-5274Roy Li2014-10-311-0/+1
| | | | | | | | | | | Cross-site scripting (XSS) vulnerability in the view operations page in phpMyAdmin 4.1.x before 4.1.14.3 and 4.2.x before 4.2.7.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted view name, related to js/functions.js. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5274 Signed-off-by: Roy Li <rongqing.li@windriver.com>
* phpmyadmin: fix for Security Advisory CVE-2014-5273Roy Li2014-10-311-0/+1
| | | | | | | | | | | | | | Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.2, 4.1.x before 4.1.14.3, and 4.2.x before 4.2.7.1 allow remote authenticated users to inject arbitrary web script or HTML via the (1) browse table page, related to js/sql.js; (2) ENUM editor page, related to js/functions.js; (3) monitor page, related to js/server_status_monitor.js; (4) query charts page, related to js/tbl_chart.js; or (5) table relations page, related to libraries/tbl_relation.lib.php. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5273 Signed-off-by: Roy Li <rongqing.li@windriver.com>
* phpmyadmin: add bash to RDEPENDS_phpmyadminRobert Yang2014-09-261-0/+1
| | | | | | | | | | | | | | | | Bashism: possible bashism in plugins/transformations/generator_plugin.sh line 16 (echo -e): echo -e "Usage: ./generator_plugin.sh MIMEType MIMESubtype TransformationName [Description]\n" possible bashism in plugins/transformations/generator_plugin.sh line 28 (${parm,[,][pat]} or ${parm^[^][pat]}): MT="${MT^}" possible bashism in plugins/transformations/generator_plugin.sh line 29 (${parm,[,][pat]} or ${parm^[^][pat]}): MS="${MS^}" possible bashism in plugins/transformations/generator_plugin.sh line 30 (${parm,[,][pat]} or ${parm^[^][pat]}): TN="${TN^}" possible bashism in plugins/transformations/generator_plugin.sh line 51 (should be 'b = a'): if [ "$4" == "--generate_only_main_class" ]; then Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
* phpmyadmin: update to 4.2.7Paul Eggleton2014-08-101-0/+31
Note that this now requires MariaDB/MySQL 5.5+. Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>