Cory Benfield added the comment:

Ok, so I've taken a preliminary look at this patch. It looks good to me! I have 
one question: right now the patch as written will blow away not just 
HTTP_PROXY, but also any other mixed-case spelling of that name (e.g. 
HtTp_PrOxY) in a CGI environment.

That's *probably* not a concern: I think in practice such a spelling is almost 
never used. However, I wanted to draw it out explicitly: we should probably 
include a code comment that indicates that we know that it's a side effect of 
the code, and that we don't care.

For what it's worth, we should also consider commenting with a note regarding 
the CVE number assigned to Python. We may want to consider getting a CVE number 
for this specific fix as well, though I'd need to chat to someone in the PSRT 
at this point to get an idea of what they think.

Good work!

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue27568>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to