This is an automated email from the ASF dual-hosted git repository.

danhaywood pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/isis-site.git

commit 1af0b06538748405e6dd01dc00f01227f5ddc2f5
Author: Dan Haywood <[email protected]>
AuthorDate: Tue Oct 18 15:17:21 2022 +0100

    patches CVE ref for m8
---
 content/relnotes/2.0.0-M9/2022/2.0.0-M8/relnotes.html | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/content/relnotes/2.0.0-M9/2022/2.0.0-M8/relnotes.html 
b/content/relnotes/2.0.0-M9/2022/2.0.0-M8/relnotes.html
index 69e26aeac..e518815de 100644
--- a/content/relnotes/2.0.0-M9/2022/2.0.0-M8/relnotes.html
+++ b/content/relnotes/2.0.0-M9/2022/2.0.0-M8/relnotes.html
@@ -734,7 +734,7 @@ page.parent doesn't seem to be set...
 </ul>
 </div>
 <div class="paragraph">
-<p>This release also fixes the security vulnerability: CVE-2022-42466, fixed 
by <a href="https://issues.apache.org/jira/browse/ISIS-3128";>ISIS-3128</a></p>
+<p>This release also fixes the security vulnerability: CVE-2022-42467, fixed 
by <a href="https://issues.apache.org/jira/browse/ISIS-3128";>ISIS-3128</a></p>
 </div>
 </div>
 </div>
@@ -1077,7 +1077,7 @@ page.parent doesn't seem to be set...
 <div class="ulist">
 <ul>
 <li>
-<p><a href="https://issues.apache.org/jira/browse/ISIS-3128";>ISIS-3128</a> - 
CVE-2022-42466 [Security] h2 console potentially vulnerable to code 
execution</p>
+<p><a href="https://issues.apache.org/jira/browse/ISIS-3128";>ISIS-3128</a> - 
CVE-2022-42467 [Security] h2 console potentially vulnerable to code 
execution</p>
 </li>
 <li>
 <p><a href="https://issues.apache.org/jira/browse/ISIS-3077";>ISIS-3077</a> - 
[Vulnerability] Scalar Value Output Rendering is not escaped. (XSS 
Vulnarability)</p>

Reply via email to