[ANNOUNCE] Apache TsFile 2.0.1 released

2025-02-10 Thread Haonan Hou
The Apache TsFile team is pleased to announce the release of Apache TsFile 2.0.1. Apache TsFile is a columnar storage file format designed for time series data, which supports efficient compression, high throughput of read and write, and compatibility with various frameworks, such as Spark and Fli

[ANNOUNCE] Apache Airflow 2.10.5 Released

2025-02-10 Thread Utkarsh Sharma
Dear community, I'm happy to announce that Airflow 2.10.5 was just released. The released sources and packages can be downloaded via https://airflow.apache.org/docs/apache-airflow/2.10.5/installation/installing-from-sources.html Other installation methods are described in https://airflow.apach

[ANN] Apache Tomcat 9.0.99 available

2025-02-10 Thread Rémy Maucherat
The Apache Tomcat team announces the immediate availability of Apache Tomcat 9.0.99. Apache Tomcat 9 is an open source software implementation of the Java Servlet, JavaServer Pages, Java Unified Expression Language, Java WebSocket and JASPIC technologies. Apache Tomcat 9.0.99 is a bugfix and feat

[ANN] Apache Tomcat 11.0.3 Available

2025-02-10 Thread Mark Thomas
The Apache Tomcat team announces the immediate availability of Apache Tomcat 11.0.3. Apache Tomcat 11 is an open source software implementation of the Jakarta Servlet, Jakarta Pages, Jakarta Expression Language, Jakarta WebSocket, Jakarta Authentication and Jakarta Annotations specifications.

[ANNOUNCE] Apache Hudi 1.0.1 released

2025-02-10 Thread Sivabalan
Hello, The Apache Hudi team is pleased to announce the release of Apache Hudi 1.0.1. Apache Hudi is a transactional data lake platform that brings database and data warehouse capabilities to the data lake. Hudi reimagines slow old-school batch data processing with a powerful new incremental proce

Re: CVE-2025-23015: Apache Cassandra: User with MODIFY permission on ALL KEYSPACES can escalate privileges to superuser via unsafe actions

2025-02-10 Thread Paulo Motta
A performance regression was detected in the security releases 3.0.31 [1] and 3.11.18 [2]. Users affected by this vulnerability are recommended to upgrade to versions 3.0.32 and 3.11.19 instead. Remaining versions are unaffected. [1] - https://lists.apache.org/thread/yprngr9cmp9c43m1c56thv1v0v6y5