[ https://issues.apache.org/jira/browse/CALCITE-6229?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
hongyu guo resolved CALCITE-6229. --------------------------------- Fix Version/s: 1.37.0 Resolution: Fixed Fixed in [e17098d47|https://github.com/apache/calcite/commit/e17098d47f3c31e4d90cc17e6e1da1175bf49ae4]. [~wnoble] Thanks for your contribution! > Upgrade json-path version to 2.9.0 > ---------------------------------- > > Key: CALCITE-6229 > URL: https://issues.apache.org/jira/browse/CALCITE-6229 > Project: Calcite > Issue Type: Bug > Reporter: Will Noble > Priority: Minor > Labels: pull-request-available > Fix For: 1.37.0 > > > There is a CVE: https://osv.dev/vulnerability/GHSA-pfh2-hfmq-phg5 > Probably not critical for most users since it would be strange for > unsanitized user input to make it into the JSON parser through Calcite, but > should be easy to patch. -- This message was sent by Atlassian Jira (v8.20.10#820010)