Hi everyone,

I thank everyone who upvoted for this release and I am sure we will make it a 
success. As a start point, I have created an umbrella JIRA [HIVE-26748] Prepare 
for Hive 3.2.0 Release - ASF JIRA 
(apache.org)<https://issues.apache.org/jira/browse/HIVE-26748> where I will 
start adding the JIRAs that will be cherry picked as part of the 3.2.0 release. 
I have also included the suggestions given by the community till now in the 
email threads below.

Please feel free to suggest any new and important bug fixes or features that 
can be included as part of this release.

Thanks,
Aman.
________________________________
From: Naveen Gangam <ngan...@cloudera.com.INVALID>
Sent: Tuesday, November 8, 2022 7:49 PM
To: dev@hive.apache.org <dev@hive.apache.org>
Subject: Re: [EXTERNAL] Re: Proposal : New Release 3.2.0 | Fixing CVE's and 
Bugs on apache hive branch-3

[You don't often get email from ngan...@cloudera.com.invalid. Learn why this is 
important at https://aka.ms/LearnAboutSenderIdentification ]

Thank you Aman for volunteering to drive this. +1 for a release off
branch-3. We can fix all the CVEs we have fixed on master.

IMHO, the hadoop upgrade might be too big a task for this release. Last I
checked, there were some pending items from this upgrade even on master.
They may not be hard dependencies but if we are committing to this, might
take a bit longer to finish the release.

I started to build this Jira Board for the releases. The goal was to use
this to track release items (for all releases) via the use of jira
labels/target versions.
https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fsecure%2FRapidBoard.jspa%3FrapidView%3D564&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295835713%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=UqSB8a8yfaZIdp9TFh4bW3ASSYFxa9ior9rSZz8OhWE%3D&amp;reserved=0
At the top of this board, there are some quick filters for release blockers
(jiras with labels "hive-4.0.0-must"). There are currently only 2 jiras
tagged as blockers for 4.0.

If you could tag the jiras for 3.2 release the same way, and add a quick
filter, that would be great.

Thank you again
Naveen

On Fri, Nov 4, 2022 at 7:01 AM Stamatis Zampetakis <zabe...@gmail.com>
wrote:

> Hey everyone,
>
> It would be nice to have a new release from branch 3 although it might not
> be that trivial to get out.
>
> It will definitely require a bit of investment from multiple people
> including the PMC and the committers of the project. Note that the last
> vote for alpha2 was unsuccessful due to lack of votes, which shows that
> people are pretty busy.
>
> Personally, I support this effort and would like to see it happen but this
> period I don't have sufficient time to invest to help with reviews and
> commits for 3.X line.
>
> Best,
> Stamatis
>
> On Fri, Nov 4, 2022, 5:28 AM Aman Raj <raja...@microsoft.com.invalid>
> wrote:
>
> > Hi Chris,
> >
> > I plan on going through this diff and making a comprehensive list of all
> > the major bug fixes that went into branch-3 and not in hive-313. This
> will
> > be included in the umbrella JIRA that I am creating.
> >
> > In this email thread I have only mentioned CVEs and upgrades that will go
> > on top of these changes in branch-3.
> > Thanks,
> > Aman.
> >
> > ________________________________
> > From: Chris Nauroth <cnaur...@apache.org>
> > Sent: Friday, November 4, 2022 3:44 AM
> > To: dev@hive.apache.org <dev@hive.apache.org>
> > Subject: Re: [EXTERNAL] Re: Proposal : New Release 3.2.0 | Fixing CVE's
> > and Bugs on apache hive branch-3
> >
> > I noticed that there is a pretty large delta (256 commits) between
> release
> > 3.1.3 and the current branch-3:
> >
> > > git log --oneline rel/release-3.1.3..upstream-branch-3 | wc
> >     256    4208   33558
> >
> > I just wanted to mention that a release from branch-3 would include far
> > more than what we are cataloging on this mail thread.
> >
> > Chris Nauroth
> >
> >
> > On Thu, Nov 3, 2022 at 12:16 PM Pravin Sinha <mailpravi...@gmail.com>
> > wrote:
> >
> > > +1,
> > >
> > > Thanks for driving this, Aman. Apart from CVE fixes, do you have a list
> > of
> > > JIRAs to be targeted?
> > >
> > > -Pravin
> > >
> > > On Thu, Nov 3, 2022 at 11:12 PM Chris Nauroth <cnaur...@apache.org>
> > wrote:
> > >
> > > > Thank you for driving this!
> > > >
> > > > To kick things off, I have filed HIVE-26702 for a backport of
> > HIVE-17315
> > > (a
> > > > total of 5 sub-tasks/patches) to 3.2.0. This adds support for more
> > > flexible
> > > > configuration of the metastore's database connection pooling.
> > Dataproc's
> > > > distribution has been running this in production backported onto
> > release
> > > > 3.1.3, so I can provide the patches.
> > > >
> > > > May I assume that our intent is to keep 3.2.x backward-compatible
> with
> > > > 3.1.x?
> > > >
> > > > Chris Nauroth
> > > >
> > > >
> > > > On Thu, Nov 3, 2022 at 3:53 AM Sankar Hariappan
> > > > <sankar.hariap...@microsoft.com.invalid> wrote:
> > > >
> > > > > +1, I'm excited to see the scope includes important upgrades and
> CVE
> > > > fixes.
> > > > > We should carefully port the relevant patches from master as code
> has
> > > > been
> > > > > heavily refactored. But, it make perfect sense to give another 3.x
> > > > release
> > > > > from Hive to keep the users delighted.
> > > > > Thanks Aman for the initiative!
> > > > >
> > > > > Thanks,
> > > > > Sankar
> > > > >
> > > > > -----Original Message-----
> > > > > From: 张铎(Duo Zhang) <palomino...@gmail.com>
> > > > > Sent: Thursday, November 3, 2022 2:53 PM
> > > > > To: dev@hive.apache.org
> > > > > Subject: [EXTERNAL] Re: Proposal : New Release 3.2.0 | Fixing CVE's
> > and
> > > > > Bugs on apache hive branch-3
> > > > >
> > > > > [You don't often get email from palomino...@gmail.com. Learn why
> > this
> > > is
> > > > > important at https://aka.ms/LearnAboutSenderIdentification ]
> > > > >
> > > > > +1, and please include HIVE-24694...
> > > > >
> > > > > Thanks.
> > > > >
> > > > > Aman Raj <raja...@microsoft.com.invalid> 于2022年11月3日周四 17:03写道:
> > > > > >
> > > > > > Hi team,
> > > > > >
> > > > > >
> > > > > > We know that Hive 4.0.0 release is ongoing but considering the
> > number
> > > > of
> > > > > changes going into the release, it will take some iterations to
> come
> > up
> > > > > with the stable version for the same. Meanwhile there are a lot of
> > > issues
> > > > > in Hive 3.1.3 which our customers have reported. In this scenario,
> it
> > > > makes
> > > > > sense to make a release from branch-3 which will have all the
> > necessary
> > > > > upgrades, bug and CVE fixes which are causing issues to the
> existing
> > > > > customers. Also, Hive is still using Hadoop 3.1.0 whereas Spark 3.3
> > has
> > > > > already moved to Hadoop 3.3.1. Therefore, we need to do the same
> for
> > > > hive.
> > > > > >
> > > > > >
> > > > > >
> > > > > > I will be happy to take the ownership of this new release and
> will
> > be
> > > > > creating JIRA's for all the fixes that will go on with this
> release.
> > > > > >
> > > > > >
> > > > > >
> > > > > > Therefore, I am proposing a new release cut out from branch-3.
> The
> > > > > release version would be hive-3.2.0.
> > > > > >
> > > > > >
> > > > > >
> > > > > > This version will include major upgrades as:
> > > > > >
> > > > > >   1.  Hadoop version upgrade to 3.3.4
> > > > > >   2.  Zookeeper version upgrade to 3.6.3
> > > > > >   3.  Tez version upgrade to 0.10.2
> > > > > >   4.  Calcite version upgrade to 1.25.0
> > > > > >   5.  Orc version upgrade to 1.6.9
> > > > > >
> > > > > > This version will also include major CVE fixes as follows:
> > > > > >
> > > > > >   1.  NVD - CVE-2020-13949 (nist.gov)<
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2020-13949&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295835713%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=AFO%2BbV6pCZErOYebs1ZnG65QWSUGcXtmLs1K28avoUs%3D&amp;reserved=0
> > > > >
> > > > > - Libthrift Upgrade to 0.14.1 (OSS Jira :
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FHIVE-25098&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295835713%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=eVuYey9je%2BbBuyMZtYMNxXfjz3wagTA4KnMuiQfV3Bs%3D&amp;reserved=0
> > > > > <
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FHIVE-25098&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295835713%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=eVuYey9je%2BbBuyMZtYMNxXfjz3wagTA4KnMuiQfV3Bs%3D&amp;reserved=0
> > > > > >)
> > > > > >
> > > > > >   1.  NVD - CVE-2015-1832 (nist.gov)<
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2015-1832&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295835713%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=6bwmQlU%2FCXX0QhdqkmLr8AXB6tglUo3ZzY1wX4p5ahY%3D&amp;reserved=0
> > > > >
> > > > > - Derby upgrade to 10.14.2.0 (OSS Jira :
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.mail-archive.com%2Fdev%2540hive.apache.org%2Fmsg142721.html&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295835713%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=d4EjJUukk75DbekxQwjIid2HQkZb2zDOLnozLIM7TmY%3D&amp;reserved=0
> > > > > <
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.mail-archive.com%2Fdev%2540hive.apache.org%2Fmsg142721.html&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=IAZununr8M%2BkDFXBce%2BONhbc4%2Ff0X%2Fx3FhsZhVqMCSc%3D&amp;reserved=0
> > > > > >)
> > > > > >
> > > > > >   1.  NVD - CVE-2013-4002 (nist.gov)<
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2013-4002&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=6iIm9Xgyxt4o%2FSh%2Fzue0NMykgpeV%2FELhbjFAdkSqBuU%3D&amp;reserved=0
> > > > >
> > > > > - Xerces Upgrade to 2.12.2 (OSS Jira :
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FHIVE-25920&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=WHSHx1pbtBtBWlxtrFLJChaJh4msHMUVecTAShuILUA%3D&amp;reserved=0
> > > > > <
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FHIVE-25920&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=WHSHx1pbtBtBWlxtrFLJChaJh4msHMUVecTAShuILUA%3D&amp;reserved=0
> > > > > >)
> > > > > >
> > > > > >   1.  NVD - CVE-2020-36518 (nist.gov)<
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2020-36518&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=vnCpIvxNpUMk%2BImBBLxUlVL7reumAhcWV9AfJ0OgYCM%3D&amp;reserved=0
> > > > >
> > > > > - Jackson upgrade to 2.12.7 (OSS Jira :
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.mail-archive.com%2Fdev%40hive.apache.org%2Fmsg142871.html&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=DdjoAx4%2Fyr73l8JPloy7puYBrsAIIwyee1qMWrOUViQ%3D&amp;reserved=0
> > > > > <
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.mail-archive.com%2Fdev%40hive.apache.org%2Fmsg142871.html&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=DdjoAx4%2Fyr73l8JPloy7puYBrsAIIwyee1qMWrOUViQ%3D&amp;reserved=0
> > > > > >)
> > > > > >
> > > > > >   1.  NVD - CVE-2022-23221 (nist.gov)<
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2022-23221&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=qa%2FW1FB3oJj%2BwKv1NgYMXZiyiQUdIP8DWBDO0CFAq6g%3D&amp;reserved=0
> > > > >
> > > > > - Upgrade H2 database version to 2.1.210 (OSS Jira :
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FHIVE-25945&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=fCfoGepvr5WcFY7wX4dHPGFCFzyBy6xOxuoJCf2TH1o%3D&amp;reserved=0
> > > > > <
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FHIVE-25945&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=fCfoGepvr5WcFY7wX4dHPGFCFzyBy6xOxuoJCf2TH1o%3D&amp;reserved=0
> > > > > >)
> > > > > >
> > > > > >   1.  WS-2021-0419 | Mend Vulnerability Database<
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.mend.io%2Fvulnerability-database%2FWS-2021-0419&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=mv1f32rL0BFlUTlB6IXgKyDCXgZH8VxDscm76QybnaU%3D&amp;reserved=0
> > > > >
> > > > > - Upgrade gson to 2.8.9 (OSS Jira :
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FHIVE-26078&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=8qqfTfeFtvqEHOXY0%2FrGuygEQ6Vw9mKv3aLetmRJM2Y%3D&amp;reserved=0
> > > > > <
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FHIVE-26078&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=8qqfTfeFtvqEHOXY0%2FrGuygEQ6Vw9mKv3aLetmRJM2Y%3D&amp;reserved=0
> > > > > >)
> > > > > >
> > > > > >   1.  NVD - CVE-2020-11979 (nist.gov)<
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2020-11979&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=swPOx5pMJ9a4Rh%2F8t55M8PJG6dW%2BF7z7BofNm7oB0Fc%3D&amp;reserved=0
> > > > >
> > > > > - Upgrade ant to 1.10.9 (OSS Jira : [HIVE-26081] Upgrade ant to
> > 1.10.9
> > > -
> > > > > ASF JIRA (apache.org)<
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FHIVE-26081&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=PZGSnWGsC7IezQ6HfSjrM0tHPQGaDIiwMQIe8xcrUEA%3D&amp;reserved=0
> > > > > >)
> > > > > >
> > > > > >   1.  NVD - CVE-2020-17533 (nist.gov)<
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2020-17533&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=pPS1w5fuzVId4CsLZGmIaF2320Xef%2Bjd1AAqYbbxeP4%3D&amp;reserved=0
> > > > >
> > > > > - Upgrade accumulo-core to 1.10.1 (OSS Jira : [HIVE-26080] Upgrade
> > > > > accumulo-core to 1.10.1 - ASF JIRA (apache.org)<
> > > > >
> > > >
> > >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FHIVE-26080&amp;data=05%7C01%7Crajaman%40microsoft.com%7Ce3779d61c5654d11a6c608dac1945fdc%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638035140295991904%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=wDLfmR6UcssTfAdkEKrwFr1FcxCvgjIo%2Bmd1vOVOsdI%3D&amp;reserved=0
> > > > > >)
> > > > > >
> > > > > >
> > > > > >
> > > > > > The version can also contain critical bug fixes that have been
> > fixed
> > > in
> > > > > Open-Source master. Please suggest any other important backports
> that
> > > can
> > > > > be included in this section.
> > > > > >
> > > > > > I am thinking of the backport of transaction statistics related
> > > patches
> > > > > to enable better CBO for ACID tables and datanucleus changes to 5.x
> > can
> > > > be
> > > > > some bug fixes that we can consume in this release. This is an Open
> > > forum
> > > > > and I welcome your suggestions on the same.
> > > > > >
> > > > > >
> > > > > >
> > > > > > We can take a month or two to make this release after validating
> > the
> > > > > test scenarios and use cases. I will come up with the proper
> > timelines
> > > > for
> > > > > this 3.2.0 release once we get the community approval for the same.
> > > > > >
> > > > > >
> > > > > >
> > > > > > Thanks,
> > > > > >
> > > > > > Aman.
> > > > > >
> > > > >
> > > >
> > >
> >
>

Reply via email to