[ 
https://issues.apache.org/jira/browse/OAK-10777?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17841295#comment-17841295
 ] 

Julian Reschke edited comment on OAK-10777 at 6/6/24 10:04 AM:
---------------------------------------------------------------

trunk: (1.64.0) 
[dcae752850|https://github.com/apache/jackrabbit-oak/commit/dcae75285040b9f60d8464d5f8ea9d210d3412a6]


was (Author: reschke):
trunk: 
[dcae752850|https://github.com/apache/jackrabbit-oak/commit/dcae75285040b9f60d8464d5f8ea9d210d3412a6]


> oak-lucene: add test coverage for stack overflow based on very long and 
> complex regexp using JCR lucene native query
> --------------------------------------------------------------------------------------------------------------------
>
>                 Key: OAK-10777
>                 URL: https://issues.apache.org/jira/browse/OAK-10777
>             Project: Jackrabbit Oak
>          Issue Type: Task
>          Components: lucene
>            Reporter: Julian Reschke
>            Assignee: Julian Reschke
>            Priority: Major
>              Labels: candidate_oak_1_22
>             Fix For: 1.64.0
>
>
> This is like OAK-10713, but using a JCR query, proving that the vulnerability 
> can be triggered over JCR.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to