Subject: CAcert Code Development list.
List archive
- From: Michael Tänzer <michael.taenzer AT cacert.org>
- To: Developers CAcert <cacert-devel AT lists.cacert.org>
- Subject: Fwd: Re: Patch Request Bug #1266
- Date: Fri, 18 Apr 2014 15:03:23 +0200
- Openpgp: id=E53B124B
-------- Original Message --------
Subject: Re: Patch Request Bug #1266
Date: Fri, 18 Apr 2014 10:24:12 +0200
From: Mendel Mobach
<mendel AT cacert.org>
To: Benny Baumann
<benbe AT cacert.org>
CC:
critical-admin AT cacert.org
<critical-admin AT cacert.org>,
Jörg Thalheim
<joerg AT higgsboson.tk>,
Michael Tänzer
<michael.taenzer AT cacert.org>,
Marcus Mängel
<inopiae AT cacert.org>,
Martin Gummi
<martin.gummi AT cacert.org>,
Eva Stöwe
<estoewe AT cacert.org>
On 15 Apr 2014, at 23:26, Benny Baumann
<benbe AT cacert.org>
wrote:
> Hi folks,
>
> we have a fix for https://bugs.cacert.org/view.php?id=1266
> "Second-order SQL injection in Certificate-related queries"
The fix is installed on www.cacert.org.
Attachment:
Fwd: cvs.cacert.org checkin notification
Description: Binary data
Attachment:
signature.asc
Description: OpenPGP digital signature
- Fwd: Patch Request Bug #1266, Michael Tänzer, 04/18/2014
- <Possible follow-up(s)>
- Fwd: Re: Patch Request Bug #1266, Michael Tänzer, 04/18/2014
Archive powered by MHonArc 2.6.18.