Skip to content

Conversation

@realize096
Copy link

What happened?

There are 1 security vulnerabilities found in org.apache.calcite:calcite-core 1.26.0

What did I do?

Upgrade org.apache.calcite:calcite-core from 1.26.0 to 1.32.0 for vulnerability fix

What did you expect to happen?

Ideally, no insecure libs should be used.

How can we automate the detection of these types of issues?

By using the GitHub Actions configurations provided by murphysec, we can conduct automatic code security checks in our CI pipeline.

The specification of the pull request

PR Specification from OSCS

@github-actions github-actions bot added the DDL label Sep 6, 2023
@yanghuaiGit
Copy link
Contributor

The Calcite version that Flink 1.16 depends on is 1.36.0. Can we change 1.32 to 1.36?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants