From 04d6f9c4bda16e6b6928c4e9c8852d3bf237e5d4 Mon Sep 17 00:00:00 2001 From: "mrehak@redhat.com" Date: Tue, 9 Jul 2019 08:43:57 +0200 Subject: [PATCH] versions updated --- 2019/10xxx/CVE-2019-10135.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2019/10xxx/CVE-2019-10135.json b/2019/10xxx/CVE-2019-10135.json index 6db061d201c..074c5834ed2 100644 --- a/2019/10xxx/CVE-2019-10135.json +++ b/2019/10xxx/CVE-2019-10135.json @@ -18,7 +18,7 @@ "version": { "version_data": [ { - "version_value": "0.46.x to 0.56.1" + "version_value": "since 0.46 before 0.56.1" } ] } @@ -54,7 +54,7 @@ "description_data": [ { "lang": "eng", - "value": "A flaw was found in the yaml.load() function in the osbs-client versions 0.46.x to 0.56.1. Insecure use of the yaml.load() function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files." + "value": "A flaw was found in the yaml.load() function in the osbs-client versions since 0.46 before 0.56.1. Insecure use of the yaml.load() function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files." } ] },