This is an automated email from the ASF dual-hosted git repository.
raulcd pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/arrow-site.git
The following commit(s) were added to refs/heads/main by this push:
new 78fcb3a3f61 MINOR: Fix links in 14.0.1 blog post (#429)
78fcb3a3f61 is described below
commit 78fcb3a3f6119eb980fc87d91c19065be3c1b7f4
Author: Raúl Cumplido <[email protected]>
AuthorDate: Thu Nov 9 10:47:09 2023 -0600
MINOR: Fix links in 14.0.1 blog post (#429)
Currently links appear as plain text. Fix them to be proper links.
---------
Co-authored-by: Antoine Pitrou <[email protected]>
---
_posts/2023-11-09-14.0.1-release.md | 8 +++++---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/_posts/2023-11-09-14.0.1-release.md
b/_posts/2023-11-09-14.0.1-release.md
index a814df711a7..e5c2487a91e 100644
--- a/_posts/2023-11-09-14.0.1-release.md
+++ b/_posts/2023-11-09-14.0.1-release.md
@@ -35,7 +35,7 @@ to PyArrow 14.0.1 or later. Binary packages are available on
PyPI and conda-forg
If it is not possible to upgrade, we provide a separate package
`pyarrow-hotfix`
that disables the vulnerability on older PyArrow versions.
-See https://pypi.org/project/pyarrow-hotfix/ for instructions.
+See [usage instructions][1].
## Vulnerability description
@@ -46,5 +46,7 @@ if it reads Arrow IPC, Feather or Parquet data from untrusted
sources
This vulnerability only affects PyArrow, not other Apache Arrow
implementations or bindings.
-Reference:
-https://www.cve.org/CVERecord?id=CVE-2023-47248
+Reference: [CVE-2023-47248][2].
+
+[1]: https://pypi.org/project/pyarrow-hotfix/
+[2]: https://www.cve.org/CVERecord?id=CVE-2023-47248