From 0ea48260853f5efda379941beea1d59fd08299ac Mon Sep 17 00:00:00 2001 From: twu <199651+twu@users.noreply.github.com> Date: Mon, 7 Nov 2022 22:48:00 +0100 Subject: [PATCH] Fix issue with parsing details in PYSEC-2022-42969 (#107) Co-authored-by: twu --- vulns/py/PYSEC-2022-42969.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/vulns/py/PYSEC-2022-42969.yaml b/vulns/py/PYSEC-2022-42969.yaml index 4a3ad393..968c8608 100644 --- a/vulns/py/PYSEC-2022-42969.yaml +++ b/vulns/py/PYSEC-2022-42969.yaml @@ -1,5 +1,8 @@ id: PYSEC-2022-42969 -details: Taken from [Github Advisory Database](https://github.com/advisories/GHSA-w596-4wvx-j9j6): The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. +details: The py library through 1.11.0 for Python allows remote attackers to + conduct a ReDoS (Regular expression Denial of Service) attack via a + Subversion repository with crafted info data, because the InfoSvnCommand + argument is mishandled. affected: - package: name: py