https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=208282
--- Comment #3 from Kubilay Kocak ---
@Emmanuel, To what extent is this issue a bug that should also be fixed
upstream?
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=208282
Kubilay Kocak changed:
What|Removed |Added
See Also||https://bugs.freebsd.org/bu
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=210539
Vladimir Krstulja changed:
What|Removed |Added
See Also||https://bugs.freebsd.org/bu
Vladimir Krstulja has reassigned Bugzilla
Automation 's request for maintainer-feedback to FreeBSD
Python :
Bug 210539: lang/python33: HTTP Header Injection in Python urllib
(CVE-2016-5699)
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=210539
--- Description ---
Python 3.3 is vulnerable to
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=210539
Bug ID: 210539
Summary: lang/python33: HTTP Header Injection in Python urllib
(CVE-2016-5699)
Product: Ports & Packages
Version: Latest
Hardware: Any
U
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=210517
Bug ID: 210517
Summary: devel/py-twisted: Update to 16.2.0
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Severity: Aff
y...@rawbw.com has reassigned Bugzilla Automation 's
request for maintainer-feedback to FreeBSD Python :
Bug 210517: devel/py-twisted: Update to 16.2.0
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=210517
--- Description ---
Created attachment 171740
--> https://bugs.freebsd.org/bugzilla/a