diff --git a/advisories/github-reviewed/2022/10/GHSA-w596-4wvx-j9j6/GHSA-w596-4wvx-j9j6.json b/advisories/github-reviewed/2022/10/GHSA-w596-4wvx-j9j6/GHSA-w596-4wvx-j9j6.json index 31a681a0019a2..9b10c25fe7628 100644 --- a/advisories/github-reviewed/2022/10/GHSA-w596-4wvx-j9j6/GHSA-w596-4wvx-j9j6.json +++ b/advisories/github-reviewed/2022/10/GHSA-w596-4wvx-j9j6/GHSA-w596-4wvx-j9j6.json @@ -1,13 +1,13 @@ { "schema_version": "1.3.0", "id": "GHSA-w596-4wvx-j9j6", - "modified": "2022-10-18T18:03:13Z", + "modified": "2022-10-19T07:59:30Z", "published": "2022-10-16T12:00:23Z", "aliases": [ "CVE-2022-42969" ], "summary": "ReDoS in py library", - "details": "The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.", + "details": "The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.\n\n**NOTE:** The affected code is unlikely to be in any production use. In particular, is is *not* used by pytest, which is by far the biggest reverse dependency of the `py` library.", "severity": [ { "type": "CVSS_V3",