Upstream announcement:
Welcome to phpMyAdmin 4.9.0.1, a bugfix release that includes important security fixes.
This release fixes two security vulnerabilities:
Upgrading is highly recommended for all users. Using the 'http' auth_type instead of 'cookie' can mitigate the CSRF attack.
The solution for the CSRF attack does remove the former functionality to log in directly through URL parameters (as mentioned in FAQ 4.8, such as https://example.com/phpmyadmin/?pma_username=root&password=foo). Such behavior was discouraged and is now removed. Other query parameters work as expected; only pma_username and pma_password have been removed.
This release also includes fixes for many bugs, including:
There are many, many more bug fixes thanks to the efforts of our developers, Google Summer of Code applicants, and other contributors.
The phpMyAdmin team
phpmyadmin/sql-parser version 4.3.2
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2019-33649e2e64
Please login to add feedback.
This update has been submitted for testing by remi.
This update test gating status has been changed to 'waiting'.
This update test gating status has been changed to 'ignored'.
remi edited this update.
This update has been pushed to testing.
This update has reached 7 days in testing and can be pushed to stable now if the maintainer wishes
This update has been submitted for stable by remi.
This update has been pushed to stable.