From e9227d928f69de20414bb704f52c283769cd043b Mon Sep 17 00:00:00 2001 From: Carl Ekerot Date: Fri, 14 Jul 2017 10:29:04 +0200 Subject: [PATCH] Add link to blog post for c2py exploit --- vulnerabilities.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/vulnerabilities.yaml b/vulnerabilities.yaml index 7f5d593..9efedf4 100644 --- a/vulnerabilities.yaml +++ b/vulnerabilities.yaml @@ -239,6 +239,8 @@ - name: "Issue #28563: gettext.c2py()" bpo: 28563 + links: + - https://www.xil.se/post/is-eval-safe-yet-rspkt/ fixed-in: - a8760275bd59fb8d8be1f1bf05313fed31c08321 # 2.7 - 07bcf05fcf3fd1d4001e8e3489162e6d67638285 # 3.3