The branch, master has been updated
       via  43202720e8bf301cd37eb5384c2fd1227ef43073 (commit)
      from  4058bd0bd23780d16eb957812f6296c512bf3762 (commit)


- Log -----------------------------------------------------------------
commit 43202720e8bf301cd37eb5384c2fd1227ef43073
Author: Michal Čihař <[email protected]>
Date:   Fri Jul 8 12:43:30 2011 +0200

    Clarify that 2.11 is not affected here

-----------------------------------------------------------------------

Summary of changes:
 templates/security/PMASA-2011-8 |    4 ++++
 1 files changed, 4 insertions(+), 0 deletions(-)

diff --git a/templates/security/PMASA-2011-8 b/templates/security/PMASA-2011-8
index 8cd1be6..7bd14a0 100644
--- a/templates/security/PMASA-2011-8
+++ b/templates/security/PMASA-2011-8
@@ -26,6 +26,10 @@ We consider this vulnerability to be serious.
 The 3.4.3 and earlier versions are affected.
 </py:def>
 
+<py:def function="announcement_unaffected">
+Branch 2.11.x is not affected by this.
+</py:def>
+
 <py:def function="announcement_solution">
 Upgrade to phpMyAdmin 3.3.10.2 or 3.4.3.1 or apply the related patch listed 
below.
 </py:def>


hooks/post-receive
-- 
phpMyAdmin website

------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
Phpmyadmin-git mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/phpmyadmin-git

Reply via email to