Skip to content

Commit 5e1f28f

Browse files
dnskrsteveburnett
authored andcommitted
Fix the links on the doc page for the 0.291 release
1 parent bd01f3d commit 5e1f28f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

presto-docs/src/main/sphinx/release/release-0.291.rst

+2-2
Original file line numberDiff line numberDiff line change
@@ -78,9 +78,9 @@ ________________
7878
* Upgrade netty dependencies to version 4.1.115.Final in response to `CVE-2024-47535 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47535>`_. `#24137 <https://github.com/prestodb/presto/pull/24137>`_
7979
* Upgrade druid-processing to 30.0.1 in response to `CVE-2024-45384 <https://github.com/advisories/GHSA-p72w-r6fv-6g5h>`_ and `CVE-2024-45537 <https://github.com/advisories/GHSA-jh66-3545-vpm7>`_. `#23949 <https://github.com/prestodb/presto/pull/23949>`_
8080
* Upgrade lucene-core to 8.10.0 in response to `WS-2021-0646 <https://www.mend.io/vulnerability-database/WS-2021-0646>`_. `#24168 <https://github.com/prestodb/presto/pull/24168>`_
81-
* Upgrade lucene-queryparser to 8.10.0 in response to `WS-2021-0646 <https://vuln.whitesourcesoftware.com/vulnerability/WS-2021-0646>`_. `#24168 <https://github.com/prestodb/presto/pull/24168>`_
81+
* Upgrade lucene-queryparser to 8.10.0 in response to `WS-2021-0646 <https://www.mend.io/vulnerability-database/WS-2021-0646>`_. `#24168 <https://github.com/prestodb/presto/pull/24168>`_
8282
* Upgrade lucene-analyzer-common to 8.10.0 in response to `WS-2021-0646 <https://www.mend.io/vulnerability-database/WS-2021-0646>`_. `#24168 <https://github.com/prestodb/presto/pull/24168>`_
83-
* Update hibernate-validator to 6.2.0.Final in response to `CVE-2023-1932 <https://www.mend.io/vulnerability-database/CVE-2023-1932>`_ and `CVE-2020-10693 <https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10693>`_. `#24168 <https://github.com/prestodb/presto/pull/24177>`_
83+
* Update hibernate-validator to 6.2.0.Final in response to `CVE-2023-1932 <https://www.mend.io/vulnerability-database/CVE-2023-1932>`_ and `CVE-2020-10693 <https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10693>`_. `#24177 <https://github.com/prestodb/presto/pull/24177>`_
8484
* Upgrade Jackson dependencies to 2.15.4 in response to `PRISMA-2023-0067 <https://www.ibm.com/support/pages/security-bulletin-vulnerability-jackson-core-might-affect-ibm-business-automation-workflow-prisma-2023-0067>`_. `#23753 <https://github.com/prestodb/presto/pull/23753>`_
8585
* Upgrade snakeyaml to 2.0 in response to `CVE-2022-1471 <https://nvd.nist.gov/vuln/detail/CVE-2022-1471>`_ and `CVE-2022-25857 <https://nvd.nist.gov/vuln/detail/cve-2022-25857>`_ and `CVE-2017-18640 <https://nvd.nist.gov/vuln/detail/cve-2017-18640>`_ and `CVE-2022-38752 <https://nvd.nist.gov/vuln/detail/CVE-2022-38752>`_ and `CVE-2022-38751 <https://nvd.nist.gov/vuln/detail/CVE-2022-38751>`_ and `CVE-2022-38750 <https://nvd.nist.gov/vuln/detail/CVE-2022-38750>`_ and `CVE-2022-38749 <https://nvd.nist.gov/vuln/detail/CVE-2022-38749>`_ and `CVE-2022-41854 <https://nvd.nist.gov/vuln/detail/CVE-2022-41854>`_. `#24099 <https://github.com/prestodb/presto/pull/24099>`_
8686
* Upgrade nanoid to 3.3.8 in response to `CVE-2024-55565 <https://www.cve.org/CVERecord?id=CVE-2024-55565>`_. `#24273 <https://github.com/prestodb/presto/pull/24273>`_

0 commit comments

Comments
 (0)