This is an automated email from the ASF dual-hosted git repository. danhaywood pushed a commit to branch asf-site in repository https://gitbox.apache.org/repos/asf/isis-site.git
commit 1af0b06538748405e6dd01dc00f01227f5ddc2f5 Author: Dan Haywood <[email protected]> AuthorDate: Tue Oct 18 15:17:21 2022 +0100 patches CVE ref for m8 --- content/relnotes/2.0.0-M9/2022/2.0.0-M8/relnotes.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/content/relnotes/2.0.0-M9/2022/2.0.0-M8/relnotes.html b/content/relnotes/2.0.0-M9/2022/2.0.0-M8/relnotes.html index 69e26aeac..e518815de 100644 --- a/content/relnotes/2.0.0-M9/2022/2.0.0-M8/relnotes.html +++ b/content/relnotes/2.0.0-M9/2022/2.0.0-M8/relnotes.html @@ -734,7 +734,7 @@ page.parent doesn't seem to be set... </ul> </div> <div class="paragraph"> -<p>This release also fixes the security vulnerability: CVE-2022-42466, fixed by <a href="https://issues.apache.org/jira/browse/ISIS-3128">ISIS-3128</a></p> +<p>This release also fixes the security vulnerability: CVE-2022-42467, fixed by <a href="https://issues.apache.org/jira/browse/ISIS-3128">ISIS-3128</a></p> </div> </div> </div> @@ -1077,7 +1077,7 @@ page.parent doesn't seem to be set... <div class="ulist"> <ul> <li> -<p><a href="https://issues.apache.org/jira/browse/ISIS-3128">ISIS-3128</a> - CVE-2022-42466 [Security] h2 console potentially vulnerable to code execution</p> +<p><a href="https://issues.apache.org/jira/browse/ISIS-3128">ISIS-3128</a> - CVE-2022-42467 [Security] h2 console potentially vulnerable to code execution</p> </li> <li> <p><a href="https://issues.apache.org/jira/browse/ISIS-3077">ISIS-3077</a> - [Vulnerability] Scalar Value Output Rendering is not escaped. (XSS Vulnarability)</p>
