This is an automated email from the ASF dual-hosted git repository.

raulcd pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/arrow-site.git


The following commit(s) were added to refs/heads/main by this push:
     new 78fcb3a3f61 MINOR: Fix links in 14.0.1 blog post (#429)
78fcb3a3f61 is described below

commit 78fcb3a3f6119eb980fc87d91c19065be3c1b7f4
Author: Raúl Cumplido <[email protected]>
AuthorDate: Thu Nov 9 10:47:09 2023 -0600

    MINOR: Fix links in 14.0.1 blog post (#429)
    
    Currently links appear as plain text. Fix them to be proper links.
    
    ---------
    
    Co-authored-by: Antoine Pitrou <[email protected]>
---
 _posts/2023-11-09-14.0.1-release.md | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/_posts/2023-11-09-14.0.1-release.md 
b/_posts/2023-11-09-14.0.1-release.md
index a814df711a7..e5c2487a91e 100644
--- a/_posts/2023-11-09-14.0.1-release.md
+++ b/_posts/2023-11-09-14.0.1-release.md
@@ -35,7 +35,7 @@ to PyArrow 14.0.1 or later. Binary packages are available on 
PyPI and conda-forg
 
 If it is not possible to upgrade, we provide a separate package 
`pyarrow-hotfix`
 that disables the vulnerability on older PyArrow versions.
-See https://pypi.org/project/pyarrow-hotfix/ for instructions.
+See [usage instructions][1].
 
 ## Vulnerability description
 
@@ -46,5 +46,7 @@ if it reads Arrow IPC, Feather or Parquet data from untrusted 
sources
 
 This vulnerability only affects PyArrow, not other Apache Arrow 
implementations or bindings.
 
-Reference:
-https://www.cve.org/CVERecord?id=CVE-2023-47248
+Reference: [CVE-2023-47248][2].
+
+[1]: https://pypi.org/project/pyarrow-hotfix/
+[2]: https://www.cve.org/CVERecord?id=CVE-2023-47248

Reply via email to