[
https://issues.apache.org/jira/browse/OAK-10777?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17841295#comment-17841295
]
Julian Reschke edited comment on OAK-10777 at 6/6/24 10:04 AM:
---------------------------------------------------------------
trunk: (1.64.0)
[dcae752850|https://github.com/apache/jackrabbit-oak/commit/dcae75285040b9f60d8464d5f8ea9d210d3412a6]
was (Author: reschke):
trunk:
[dcae752850|https://github.com/apache/jackrabbit-oak/commit/dcae75285040b9f60d8464d5f8ea9d210d3412a6]
> oak-lucene: add test coverage for stack overflow based on very long and
> complex regexp using JCR lucene native query
> --------------------------------------------------------------------------------------------------------------------
>
> Key: OAK-10777
> URL: https://issues.apache.org/jira/browse/OAK-10777
> Project: Jackrabbit Oak
> Issue Type: Task
> Components: lucene
> Reporter: Julian Reschke
> Assignee: Julian Reschke
> Priority: Major
> Labels: candidate_oak_1_22
> Fix For: 1.64.0
>
>
> This is like OAK-10713, but using a JCR query, proving that the vulnerability
> can be triggered over JCR.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)