Skip to content

Commit

Permalink
Fix issue with parsing details in PYSEC-2022-42969 (#107)
Browse files Browse the repository at this point in the history
Co-authored-by: twu <twu@users.noreply.github.com>
  • Loading branch information
twu and twu committed Nov 7, 2022
1 parent b4fbda6 commit 0ea4826
Showing 1 changed file with 4 additions and 1 deletion.
5 changes: 4 additions & 1 deletion vulns/py/PYSEC-2022-42969.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,8 @@
id: PYSEC-2022-42969
details: Taken from [Github Advisory Database](https://github.com/advisories/GHSA-w596-4wvx-j9j6): The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.
details: The py library through 1.11.0 for Python allows remote attackers to
conduct a ReDoS (Regular expression Denial of Service) attack via a
Subversion repository with crafted info data, because the InfoSvnCommand
argument is mishandled.
affected:
- package:
name: py
Expand Down

0 comments on commit 0ea4826

Please sign in to comment.