This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-staging in repository https://gitbox.apache.org/repos/asf/accumulo-website.git
The following commit(s) were added to refs/heads/asf-staging by this push: new 4f03768 Automatic Site Publish by Buildbot 4f03768 is described below commit 4f037686aaa51c715f34a8d1265e9f09391f6795 Author: buildbot <us...@infra.apache.org> AuthorDate: Tue Dec 29 16:08:36 2020 +0000 Automatic Site Publish by Buildbot --- output/feed.xml | 12 ++++++------ output/release/accumulo-1.10.1/index.html | 4 ++-- output/release/accumulo-2.0.1/index.html | 4 ++-- 3 files changed, 10 insertions(+), 10 deletions(-) diff --git a/output/feed.xml b/output/feed.xml index 1522ac2..c79258e 100644 --- a/output/feed.xml +++ b/output/feed.xml @@ -6,8 +6,8 @@ </description> <link>https://accumulo.apache.org/</link> <atom:link href="https://accumulo.apache.org/feed.xml" rel="self" type="application/rss+xml"/> - <pubDate>Tue, 29 Dec 2020 05:11:01 +0000</pubDate> - <lastBuildDate>Tue, 29 Dec 2020 05:11:01 +0000</lastBuildDate> + <pubDate>Tue, 29 Dec 2020 16:08:30 +0000</pubDate> + <lastBuildDate>Tue, 29 Dec 2020 16:08:30 +0000</lastBuildDate> <generator>Jekyll v4.1.1</generator> @@ -17,7 +17,7 @@ <p>Since 2.0 is a non-LTM release line, and since an LTM release line has not yet been made available for 2.x, this patch backports critical bug fixes to 2.0 to -address security bug <a href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E">CVE-2020-17533</a> that could affect any existing 2.0.0 +address security bug <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533">CVE-2020-17533</a> that could affect any existing 2.0.0 users. Users that have already migrated to 2.0.0 are urged to upgrade to 2.0.1 as soon as possible, and users of 1.10 who wish to upgrade to 2.0 should upgrade directly to 2.0.1, bypassing 2.0.0.</p> @@ -29,7 +29,7 @@ this list, please <a href="/contact-us">contact</a> us to <h2 id="critical-bug-fixes">Critical Bug Fixes</h2> <p>This release includes critical bug fixes to fix security bugs identified as -<a href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E">CVE-2020-17533</a>:</p> +<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533">CVE-2020-17533</a>:</p> <ul> <li><a href="https://github.com/apache/accumulo/issues/1828">#1828</a>, <a href="https://github.com/apache/accumulo/issues/1832">#1832</a> Throw exceptions when permission checks fail, @@ -104,14 +104,14 @@ this list, please <a href="/contact-us">contact</a> us to <p>Users of 1.10.0 or earlier are urged to upgrade to 1.10.1 as soon as possible, as this is a continuation of the 1.10 LTM release line with critical bug fixes -for security bug <a href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E">CVE-2020-17533</a>. Users are also encouraged to consider +for security bug <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533">CVE-2020-17533</a>. Users are also encouraged to consider migrating to a 2.x version when one that is suitable for their needs becomes available.</p> <h2 id="critical-bug-fixes">Critical Bug Fixes</h2> <p>This release includes critical bug fixes to fix security bugs identified as -<a href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E">CVE-2020-17533</a>:</p> +<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533">CVE-2020-17533</a>:</p> <ul> <li><a href="https://github.com/apache/accumulo/issues/1830">#1830</a>, <a href="https://github.com/apache/accumulo/issues/1832">#1832</a> Throw exceptions when permission checks fail, diff --git a/output/release/accumulo-1.10.1/index.html b/output/release/accumulo-1.10.1/index.html index a8dd068..d6a9d71 100644 --- a/output/release/accumulo-1.10.1/index.html +++ b/output/release/accumulo-1.10.1/index.html @@ -171,14 +171,14 @@ this list, please <a href="/contact-us">contact</a> us to have it included.</p> <p>Users of 1.10.0 or earlier are urged to upgrade to 1.10.1 as soon as possible, as this is a continuation of the 1.10 LTM release line with critical bug fixes -for security bug <a href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E">CVE-2020-17533</a>. Users are also encouraged to consider +for security bug <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533">CVE-2020-17533</a>. Users are also encouraged to consider migrating to a 2.x version when one that is suitable for their needs becomes available.</p> <h2 id="critical-bug-fixes">Critical Bug Fixes</h2> <p>This release includes critical bug fixes to fix security bugs identified as -<a href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E">CVE-2020-17533</a>:</p> +<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533">CVE-2020-17533</a>:</p> <ul> <li><a href="https://github.com/apache/accumulo/issues/1830">#1830</a>, <a href="https://github.com/apache/accumulo/issues/1832">#1832</a> Throw exceptions when permission checks fail, diff --git a/output/release/accumulo-2.0.1/index.html b/output/release/accumulo-2.0.1/index.html index 31ec416..d8d48af 100644 --- a/output/release/accumulo-2.0.1/index.html +++ b/output/release/accumulo-2.0.1/index.html @@ -163,7 +163,7 @@ <p>Since 2.0 is a non-LTM release line, and since an LTM release line has not yet been made available for 2.x, this patch backports critical bug fixes to 2.0 to -address security bug <a href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E">CVE-2020-17533</a> that could affect any existing 2.0.0 +address security bug <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533">CVE-2020-17533</a> that could affect any existing 2.0.0 users. Users that have already migrated to 2.0.0 are urged to upgrade to 2.0.1 as soon as possible, and users of 1.10 who wish to upgrade to 2.0 should upgrade directly to 2.0.1, bypassing 2.0.0.</p> @@ -175,7 +175,7 @@ this list, please <a href="/contact-us">contact</a> us to have it included.</p> <h2 id="critical-bug-fixes">Critical Bug Fixes</h2> <p>This release includes critical bug fixes to fix security bugs identified as -<a href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E">CVE-2020-17533</a>:</p> +<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533">CVE-2020-17533</a>:</p> <ul> <li><a href="https://github.com/apache/accumulo/issues/1828">#1828</a>, <a href="https://github.com/apache/accumulo/issues/1832">#1832</a> Throw exceptions when permission checks fail,