You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@jena.apache.org by "rvesse (via GitHub)" <gi...@apache.org> on 2023/04/26 10:25:58 UTC

[GitHub] [jena-site] rvesse commented on a diff in pull request #157: Advisory and doc updates for CVE-2023-22665

rvesse commented on code in PR #157:
URL: https://github.com/apache/jena-site/pull/157#discussion_r1177674985


##########
source/about_jena/security-advisories.md:
##########
@@ -50,9 +50,23 @@ policy above we advise users to always utilise the latest Jena release available
 
 Please refer to the individual CVE links for further details and mitigations.
 
+## CVE-2023-22665 - Exposure of arbitrary execution in script engine expressions.
+
+[CVE-2023](https://www.cve.org/CVERecord?id=CVE-2023-22665) affects Jena ?? through 4.7.0 and relates to the [Javascript

Review Comment:
   - [ ] Need to go back through release notes to see when this feature was introduced



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscribe@jena.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org