You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: presto-docs/src/main/sphinx/release/release-0.291.rst
+2-2
Original file line number
Diff line number
Diff line change
@@ -78,9 +78,9 @@ ________________
78
78
* Upgrade netty dependencies to version 4.1.115.Final in response to `CVE-2024-47535 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47535>`_. `#24137 <https://github.com/prestodb/presto/pull/24137>`_
79
79
* Upgrade druid-processing to 30.0.1 in response to `CVE-2024-45384 <https://github.com/advisories/GHSA-p72w-r6fv-6g5h>`_ and `CVE-2024-45537 <https://github.com/advisories/GHSA-jh66-3545-vpm7>`_. `#23949 <https://github.com/prestodb/presto/pull/23949>`_
80
80
* Upgrade lucene-core to 8.10.0 in response to `WS-2021-0646 <https://www.mend.io/vulnerability-database/WS-2021-0646>`_. `#24168 <https://github.com/prestodb/presto/pull/24168>`_
81
-
* Upgrade lucene-queryparser to 8.10.0 in response to `WS-2021-0646 <https://vuln.whitesourcesoftware.com/vulnerability/WS-2021-0646>`_. `#24168 <https://github.com/prestodb/presto/pull/24168>`_
81
+
* Upgrade lucene-queryparser to 8.10.0 in response to `WS-2021-0646 <https://www.mend.io/vulnerability-database/WS-2021-0646>`_. `#24168 <https://github.com/prestodb/presto/pull/24168>`_
82
82
* Upgrade lucene-analyzer-common to 8.10.0 in response to `WS-2021-0646 <https://www.mend.io/vulnerability-database/WS-2021-0646>`_. `#24168 <https://github.com/prestodb/presto/pull/24168>`_
83
-
* Update hibernate-validator to 6.2.0.Final in response to `CVE-2023-1932 <https://www.mend.io/vulnerability-database/CVE-2023-1932>`_ and `CVE-2020-10693 <https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10693>`_. `#24168<https://github.com/prestodb/presto/pull/24177>`_
83
+
* Update hibernate-validator to 6.2.0.Final in response to `CVE-2023-1932 <https://www.mend.io/vulnerability-database/CVE-2023-1932>`_ and `CVE-2020-10693 <https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10693>`_. `#24177<https://github.com/prestodb/presto/pull/24177>`_
84
84
* Upgrade Jackson dependencies to 2.15.4 in response to `PRISMA-2023-0067 <https://www.ibm.com/support/pages/security-bulletin-vulnerability-jackson-core-might-affect-ibm-business-automation-workflow-prisma-2023-0067>`_. `#23753 <https://github.com/prestodb/presto/pull/23753>`_
85
85
* Upgrade snakeyaml to 2.0 in response to `CVE-2022-1471 <https://nvd.nist.gov/vuln/detail/CVE-2022-1471>`_ and `CVE-2022-25857 <https://nvd.nist.gov/vuln/detail/cve-2022-25857>`_ and `CVE-2017-18640 <https://nvd.nist.gov/vuln/detail/cve-2017-18640>`_ and `CVE-2022-38752 <https://nvd.nist.gov/vuln/detail/CVE-2022-38752>`_ and `CVE-2022-38751 <https://nvd.nist.gov/vuln/detail/CVE-2022-38751>`_ and `CVE-2022-38750 <https://nvd.nist.gov/vuln/detail/CVE-2022-38750>`_ and `CVE-2022-38749 <https://nvd.nist.gov/vuln/detail/CVE-2022-38749>`_ and `CVE-2022-41854 <https://nvd.nist.gov/vuln/detail/CVE-2022-41854>`_. `#24099 <https://github.com/prestodb/presto/pull/24099>`_
86
86
* Upgrade nanoid to 3.3.8 in response to `CVE-2024-55565 <https://www.cve.org/CVERecord?id=CVE-2024-55565>`_. `#24273 <https://github.com/prestodb/presto/pull/24273>`_
0 commit comments