[Phpmyadmin-git] [SCM] phpMyAdmin website branch, master, updated. 4058bd0bd23780d16eb957812f6296c512bf3762

Marc Delisle lem9 at users.sourceforge.net
Mon Jul 4 13:18:11 CEST 2011


The branch, master has been updated
       via  4058bd0bd23780d16eb957812f6296c512bf3762 (commit)
      from  93b17ee20ed413d79e41250f1cc55ae9961f3123 (commit)


- Log -----------------------------------------------------------------
commit 4058bd0bd23780d16eb957812f6296c512bf3762
Author: Marc Delisle <marc at infomarc.info>
Date:   Mon Jul 4 07:18:01 2011 -0400

    Clarification about need for token

-----------------------------------------------------------------------

Summary of changes:
 templates/security/PMASA-2011-7 |    4 +++-
 1 files changed, 3 insertions(+), 1 deletions(-)

diff --git a/templates/security/PMASA-2011-7 b/templates/security/PMASA-2011-7
index 294d7d7..a33048c 100644
--- a/templates/security/PMASA-2011-7
+++ b/templates/security/PMASA-2011-7
@@ -11,7 +11,7 @@ PMASA-2011-7
 </py:def>
 
 <py:def function="announcement_updated">
-2011-07-03
+2011-07-04
 </py:def>
 
 <py:def function="announcement_summary">
@@ -30,6 +30,8 @@ We consider this vulnerability to be serious.
 All PHP versions that were current at the time of the advisory (5.3.6,
 5.2.17) on all OS are vulnerable, unless the Suhosin patch has been
 installed.
+
+An attacker must be logged in via phpMyAdmin to exploit this problem.
 </py:def>
 
 <py:def function="announcement_affected">


hooks/post-receive
-- 
phpMyAdmin website




More information about the Git mailing list