File _patchinfo of Package patchinfo.10536

<patchinfo incident="10536">
  <issue tracker="bnc" id="1137496">VUL-0: CVE-2019-11768: phpmyadmin: specially crafted database name in the designer feature can be used to trigger an SQL injection attack</issue>
  <issue tracker="bnc" id="1137497">VUL-0: CVE-2019-12616: phpmyadmin: broken tag provided by attacker and pointing at the victim's phpMyAdmin database can cause CSRF</issue>
  <issue tracker="cve" id="2019-12616"/>
  <issue tracker="cve" id="2019-11768"/>
  <category>security</category>
  <rating>moderate</rating>
  <packager>computersalat</packager>
  <description>This update for phpMyAdmin fixes the following issues:

phpMyAdmin was updated to 4.9.0.1:

* Several issues with SYSTEM VERSIONING tables
* Fixed json encode error in export
* Fixed JavaScript events not activating on input (sql bookmark issue)
* Show Designer combo boxes when adding a constraint
* Fix edit view
* Fixed invalid default value for bit field
* Fix several errors relating to GIS data types
* Fixed javascript error PMA_messages is not defined
* Fixed import XML data with leading zeros
* Fixed php notice, added support for 'DELETE HISTORY' table privilege (MariaDB &gt;= 10.3.4)
* Fixed MySQL 8.0.0 issues with GIS display
* Fixed "Server charset" in "Database server" tab showing wrong information
* Fixed can not copy user on Percona Server 5.7
* Updated sql-parser to version 4.3.2, which fixes several parsing and linting problems

- boo#1137497 / PMASA-2019-4 / CVE-2019-12616 / CWE-661: Fixed CSRF vulnerability in login form
  https://www.phpmyadmin.net/security/PMASA-2019-4/

- boo#1137496 / PMASA-2019-3 / CVE-2019-11768 / CWE-661: Fixed SQL injection in Designer feature
  https://www.phpmyadmin.net/security/PMASA-2019-3/

</description>
  <summary>Security update for phpMyAdmin</summary>
</patchinfo>