[
https://issues.apache.org/jira/browse/CALCITE-6229?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
hongyu guo resolved CALCITE-6229.
---------------------------------
Fix Version/s: 1.37.0
Resolution: Fixed
Fixed in
[e17098d47|https://github.com/apache/calcite/commit/e17098d47f3c31e4d90cc17e6e1da1175bf49ae4].
[~wnoble] Thanks for your contribution!
> Upgrade json-path version to 2.9.0
> ----------------------------------
>
> Key: CALCITE-6229
> URL: https://issues.apache.org/jira/browse/CALCITE-6229
> Project: Calcite
> Issue Type: Bug
> Reporter: Will Noble
> Priority: Minor
> Labels: pull-request-available
> Fix For: 1.37.0
>
>
> There is a CVE: https://osv.dev/vulnerability/GHSA-pfh2-hfmq-phg5
> Probably not critical for most users since it would be strange for
> unsanitized user input to make it into the JSON parser through Calcite, but
> should be easy to patch.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)