Skip to content

Commit c400ae9

Browse files
committed
Merge remote-tracking branch 'github/master'
2 parents 438b467 + 70eb229 commit c400ae9

File tree

4 files changed

+11
-52
lines changed

4 files changed

+11
-52
lines changed

RELEASENOTES.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,9 @@
11
# MATLAB Interface *for RabbitMQ-MATLAB Production Server Messaging Client®*
22
# Release Notes
33

4+
## Release 0.1.1 (22nd Apr 2020)
5+
* Minor fixes
6+
47
## Release 0.1.0 (December 2019)
58
* Initial release supporting RabbitMQ
69

SECURITY.md

Lines changed: 5 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -1,50 +1,6 @@
1-
# Security Reporting
1+
# Reporting Security Vulnerabilities
22

3-
Report suspected security issues to `security@mathworks.com`. This mail is delivered to a small security team. For critical problems you may encrypt your report (see below).
4-
5-
Please use a descriptive subject line for your report email. In addition, please include the following information along with your report:
6-
7-
* Your name and affiliation (if any).
8-
* A description of the technical details of the vulnerabilities. It is very important to let us know how we can reproduce your findings.
9-
* An explanation who can exploit this vulnerability, and what they gain when doing so -- write an attack scenario. This will help us evaluate your report quickly, especially if the issue is complex.
10-
* Whether this vulnerability public or known to third parties. If it is, please provide details.
11-
12-
If you believe that an existing (public) issue is security-related, please send an email to `security@mathworks.com`. The email should include the issue ID and a short description of why it should be handled according to this security policy.
13-
14-
## Encryption key for `security@mathworks.com`
15-
16-
If your disclosure is extremely sensitive, you may choose to encrypt your report using the key below. Please only use this for critical security reports.
17-
18-
```text
19-
-----BEGIN PGP PUBLIC KEY BLOCK-----
20-
21-
mQENBF0LglQBCADajWuKG6vM/f7OpUX4MlW8PrP5v0+tpqxFzkP8JHazJbi8GmNH
22-
ZZ2cgZg21gdCQlADTZ4V8bBXwZjewp43WtQmMai0kph8p3hZh0fQkQVQV4Nf6bHF
23-
i/j4Y8x8v2J+jCjEV7a9H4eIx48h+FCP+jLMuVX3pGnhtBuAJzV4p29KsgWckIfc
24-
FfJmWFDHuj28MFJL18YKA7v5U5v4L5NRWLemTa2psW5nNT8WGFOf+5A8r0d6xYKr
25-
/kMljkPoB9wOWQt7btWZ7yVSIDA9z0dLPDXsbenrzSRXZATyriLMx4qG/FNfsCXA
26-
pIAIhW3LL5630PjHTOd4g9ZMT1XVMhyM3ChBABEBAAG0K01hdGhXb3JrcyBTZWN1
27-
cml0eSA8c2VjdXJpdHlAbWF0aHdvcmtzLmNvbT6JAVQEEwEIAD4WIQR/LQ6Bsmf9
28-
bqqXE9EJSpA24sg5zQUCXQuCVAIbAwUJA8PjrAULCQgHAgYVCgkICwIEFgIDAQIe
29-
AQIXgAAKCRAJSpA24sg5zbWaCACzJmNcWySgTfRp6aLEuN0shyQkVi85h/jLj8go
30-
tnDVcGYZOe53gZw+oTUugdL4TJE0vVXaGsQ/0Jc7hiSGfKHMpU/pXNBmxZOfcUmi
31-
OVG1nAxj1ulvyImUUhahaMSeBtnlYwK/LTipD43AFwVm/h/wMA08Empm/0WeZhvo
32-
NOEsIuales8OxyUK3z+8p0407K6LIlWp5sy5NbhLEA7AXtIcGPV/V9CCytZ9P/Xm
33-
evuHjxnAnV8fGOxgb5zjTKNL1+Rx03DWz2sW1qT2/5kxic2zTUDbMUBbu4p63d5e
34-
BbPBvWwt4GIAdmqMDnb8j6YSp7UgULf3sertDYQbNfNgTk14uQENBF0LglQBCACl
35-
I61kKmTnHex7eRtgMLXRTHcxU7jJFyTsJvbH9V1tNRH3BvRpP5omr2gnuO8/b4jA
36-
QPiKJ26xSTIzAiiFkfte/oyCgBjLDwDwfKPF6VRd8tDGxK6f/jnIir5GVWcz6cWB
37-
n2CkmusCeft6T6uOKCsPWzzft1aDVC+O1h5vEW5wUaWU6wzD5o68YoR2vSLVdh7I
38-
u70QvCdxH9MAFPzWxKwbKsl89z6k6rUWFsruZ/x/Z80qvxm6z3bC9fitm9MZD8zX
39-
prtiDJjMTDvuvkltwq6O4r/aVvX4eidkV5kcVacXEJbp25ahwDw/4EZEji8d34Zg
40-
QuNdxQQP+ciFjoSTJZfpABEBAAGJATwEGAEIACYWIQR/LQ6Bsmf9bqqXE9EJSpA2
41-
4sg5zQUCXQuCVAIbDAUJA8PjrAAKCRAJSpA24sg5zX1jCADFZrmOpigz3n0LEzJI
42-
zRI9i7xOI/OMCZtONqN+TBZqA/d2lXUo0ImTj+DJ48N+t9nmnCUoB33Khal/oa2S
43-
PZTAzkBHtCp+3Ecao/Lb2iUA2Izuv+k3W+3IetCFFVDRWkouFJ0Ht/mZPuas4+3L
44-
3fEKR84Abrk7HJKNlKhJzcKXvyfgR/LR4MUCUFIqI+w13Rnre2KXHRTEECc6I24z
45-
uEOgpp9WFg4NxHZUwhqpIErGwB2DoDcc+ZnK7CzX1Au/rURmkVikHjMKov0tQmC4
46-
r1M0pUb9IcBHwr7gEtp3DbeSXYH3BpLA1sF4OY+evae9VGhj4Gm7E7ILewar1HRG
47-
CZMv
48-
=99fE
49-
-----END PGP PUBLIC KEY BLOCK-----
50-
```
3+
If you believe you have discovered a security vulnerability, please report it to
4+
[security@mathworks.com](mailto:security@mathworks.com). Please see
5+
[MathWorks Vulnerability Disclosure Policy for Security Researchers](https://www.mathworks.com/company/aboutus/policies_statements/vulnerability-disclosure-policy.html)
6+
for additional information.

Software/Java/RabbitMQClient/pom.xml

100755100644
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
<dependency>
2626
<groupId>com.rabbitmq</groupId>
2727
<artifactId>amqp-client</artifactId>
28-
<version>5.2.0</version>
28+
<version>5.4.0</version>
2929
</dependency>
3030

3131
<!-- https://mvnrepository.com/artifact/org.slf4j/slf4j-api -->
@@ -62,7 +62,7 @@
6262
<dependency>
6363
<groupId>com.fasterxml.jackson.core</groupId>
6464
<artifactId>jackson-databind</artifactId>
65-
<version>2.2.3</version>
65+
<version>2.9.10.4</version>
6666
</dependency>
6767
<dependency>
6868
<groupId>org.apache.commons</groupId>

Software/Java/RabbitMQClient/src/main/java/com/mathworks/utilities/DisplayHelper.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ public static void displayBanner() {
4848
}
4949

5050
public static void displayHeader() {
51-
LOG.info("Lumada to MATLAB Production Server Connector");
51+
LOG.info("RabbitMQ to MATLAB Production Server Connector");
5252
LOG.info("(c) 2018 MathWorks, Inc.");
5353
}
5454

0 commit comments

Comments
 (0)