Skip to Content.
Sympa Menu

cacert-devel - Fwd: Re: Patch Request Bug #1266

Subject: CAcert Code Development list.

List archive

Fwd: Re: Patch Request Bug #1266


Chronological Thread 
  • From: Michael Tänzer <michael.taenzer AT cacert.org>
  • To: Developers CAcert <cacert-devel AT lists.cacert.org>
  • Subject: Fwd: Re: Patch Request Bug #1266
  • Date: Fri, 18 Apr 2014 15:03:23 +0200
  • Openpgp: id=E53B124B




-------- Original Message --------
Subject: Re: Patch Request Bug #1266
Date: Fri, 18 Apr 2014 10:24:12 +0200
From: Mendel Mobach
<mendel AT cacert.org>
To: Benny Baumann
<benbe AT cacert.org>
CC:
critical-admin AT cacert.org

<critical-admin AT cacert.org>,
Jörg Thalheim
<joerg AT higgsboson.tk>,
Michael Tänzer
<michael.taenzer AT cacert.org>,
Marcus Mängel
<inopiae AT cacert.org>,
Martin Gummi
<martin.gummi AT cacert.org>,
Eva Stöwe
<estoewe AT cacert.org>


On 15 Apr 2014, at 23:26, Benny Baumann
<benbe AT cacert.org>
wrote:

> Hi folks,
>
> we have a fix for https://bugs.cacert.org/view.php?id=1266
> "Second-order SQL injection in Certificate-related queries"

The fix is installed on www.cacert.org.




Attachment: Fwd: cvs.cacert.org checkin notification
Description: Binary data

Attachment: signature.asc
Description: OpenPGP digital signature



  • Fwd: Patch Request Bug #1266, Michael Tänzer, 04/18/2014
    • <Possible follow-up(s)>
    • Fwd: Re: Patch Request Bug #1266, Michael Tänzer, 04/18/2014

Archive powered by MHonArc 2.6.18.

Top of Page