[ 
https://issues.apache.org/jira/browse/CALCITE-6229?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

hongyu guo resolved CALCITE-6229.
---------------------------------
    Fix Version/s: 1.37.0
       Resolution: Fixed

Fixed in 
[e17098d47|https://github.com/apache/calcite/commit/e17098d47f3c31e4d90cc17e6e1da1175bf49ae4].

[~wnoble] Thanks for your contribution!

> Upgrade json-path version to 2.9.0
> ----------------------------------
>
>                 Key: CALCITE-6229
>                 URL: https://issues.apache.org/jira/browse/CALCITE-6229
>             Project: Calcite
>          Issue Type: Bug
>            Reporter: Will Noble
>            Priority: Minor
>              Labels: pull-request-available
>             Fix For: 1.37.0
>
>
> There is a CVE: https://osv.dev/vulnerability/GHSA-pfh2-hfmq-phg5
> Probably not critical for most users since it would be strange for 
> unsanitized user input to make it into the JSON parser through Calcite, but 
> should be easy to patch.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to