Cisco Talos <vuln...@cisco.com> added the comment:

Thanks for acknowledging.  We look forward to any updates/developments on the 
issue reported.

For further information about the Cisco Vendor Vulnerability Reporting and 
Disclosure Policy please refer to this document which also links to our public 
PGP key. 
https://tools.cisco.com/security/center/resources/vendor_vulnerability_policy.html

Kind Regards,

Regina Wilson
Analyst.Business Operations
regiw...@cisco.com<mailto:regiw...@cisco.com>

[cid:CFA14CB5-B7B2-4FF7-8313-22D495F607D5@vrt.sourcefire.com]

On Jan 15, 2019, at 11:30 AM, Christian Heimes 
<rep...@bugs.python.org<mailto:rep...@bugs.python.org>> wrote:

Christian Heimes <li...@cheimes.de<mailto:li...@cheimes.de>> added the comment:

Thanks for the report!

----------
assignee:  -> christian.heimes
components: +SSL
nosy: +christian.heimes
stage:  -> needs patch
versions: +Python 3.4, Python 3.5, Python 3.6, Python 3.7, Python 3.8

_______________________________________
Python tracker <rep...@bugs.python.org<mailto:rep...@bugs.python.org>>
<https://bugs.python.org/issue35746>
_______________________________________

----------
Added file: https://bugs.python.org/file48054/image001.png

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue35746>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to