Cisco Talos <[email protected]> added the comment:
Thanks for acknowledging. We look forward to any updates/developments on the
issue reported.
For further information about the Cisco Vendor Vulnerability Reporting and
Disclosure Policy please refer to this document which also links to our public
PGP key.
https://tools.cisco.com/security/center/resources/vendor_vulnerability_policy.html
Kind Regards,
Regina Wilson
Analyst.Business Operations
[email protected]<mailto:[email protected]>
[cid:[email protected]]
On Jan 15, 2019, at 11:30 AM, Christian Heimes
<[email protected]<mailto:[email protected]>> wrote:
Christian Heimes <[email protected]<mailto:[email protected]>> added the comment:
Thanks for the report!
----------
assignee: -> christian.heimes
components: +SSL
nosy: +christian.heimes
stage: -> needs patch
versions: +Python 3.4, Python 3.5, Python 3.6, Python 3.7, Python 3.8
_______________________________________
Python tracker <[email protected]<mailto:[email protected]>>
<https://bugs.python.org/issue35746>
_______________________________________
----------
Added file: https://bugs.python.org/file48054/image001.png
_______________________________________
Python tracker <[email protected]>
<https://bugs.python.org/issue35746>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe:
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com