Cisco Talos <vuln...@cisco.com> added the comment:
Thanks for acknowledging. We look forward to any updates/developments on the
issue reported.
For further information about the Cisco Vendor Vulnerability Reporting and
Disclosure Policy please refer to this document which also links to our public
PGP key.
https://tools.cisco.com/security/center/resources/vendor_vulnerability_policy.html
Kind Regards,
Regina Wilson
Analyst.Business Operations
regiw...@cisco.com<mailto:regiw...@cisco.com>
[cid:CFA14CB5-B7B2-4FF7-8313-22D495F607D5@vrt.sourcefire.com]
On Jan 15, 2019, at 11:30 AM, Christian Heimes
<rep...@bugs.python.org<mailto:rep...@bugs.python.org>> wrote:
Christian Heimes <li...@cheimes.de<mailto:li...@cheimes.de>> added the comment:
Thanks for the report!
----------
assignee: -> christian.heimes
components: +SSL
nosy: +christian.heimes
stage: -> needs patch
versions: +Python 3.4, Python 3.5, Python 3.6, Python 3.7, Python 3.8
_______________________________________
Python tracker <rep...@bugs.python.org<mailto:rep...@bugs.python.org>>
<https://bugs.python.org/issue35746>
_______________________________________
----------
Added file: https://bugs.python.org/file48054/image001.png
_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue35746>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe:
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com