Hi Naoya,

On Thu, Oct 31, 2013 at 5:42 PM, Robert Haas <robertmh...@gmail.com> wrote:
> On Thu, Oct 31, 2013 at 1:44 AM, Asif Naeem <anaeem...@gmail.com> wrote:
>> On Thu, Oct 31, 2013 at 10:17 AM, Amit Kapila <amit.kapil...@gmail.com>
>> wrote:
>>>
>>> On Tue, Oct 29, 2013 at 12:46 PM, Naoya Anzai
>>> <anzai-na...@mxu.nes.nec.co.jp> wrote:
>>> > Hi Sandeep
>>> >
>>> >> I think, you should change the subject line  to "Unquoted service path
>>> >> containing space is vulnerable and can be exploited on Windows" to get 
>>> >> the
>>> >> attention..  :)
>>> > Thank you for advice!
>>> > I'll try to post to pgsql-bugs again.
>>>
>>> I could also reproduce this issue. The situation is very rare such
>>> that an "exe" with name same as first part of directory should exist
>>> in installation path.
>>
>
> If one of the committers who is knowledgeable about Windows has time
> to apply this *before* the next CommitFest, that's obviously great.
> But the purpose of adding a link to the next CommitFest is to provide
> a backstop, so that we're not relying solely on someone to notice this
> email thread and pick it up, but instead have the patch as part of a
> list of patches needing review.

I have uploaded your patch for next commit fest, hope you can support
it if there is any feedback for your patch by reviewer/committer.

With Regards,
Amit Kapila.
EnterpriseDB: http://www.enterprisedb.com


-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Reply via email to