This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/accumulo-website.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 4f03768  Automatic Site Publish by Buildbot
4f03768 is described below

commit 4f037686aaa51c715f34a8d1265e9f09391f6795
Author: buildbot <us...@infra.apache.org>
AuthorDate: Tue Dec 29 16:08:36 2020 +0000

    Automatic Site Publish by Buildbot
---
 output/feed.xml                           | 12 ++++++------
 output/release/accumulo-1.10.1/index.html |  4 ++--
 output/release/accumulo-2.0.1/index.html  |  4 ++--
 3 files changed, 10 insertions(+), 10 deletions(-)

diff --git a/output/feed.xml b/output/feed.xml
index 1522ac2..c79258e 100644
--- a/output/feed.xml
+++ b/output/feed.xml
@@ -6,8 +6,8 @@
 </description>
     <link>https://accumulo.apache.org/</link>
     <atom:link href="https://accumulo.apache.org/feed.xml"; rel="self" 
type="application/rss+xml"/>
-    <pubDate>Tue, 29 Dec 2020 05:11:01 +0000</pubDate>
-    <lastBuildDate>Tue, 29 Dec 2020 05:11:01 +0000</lastBuildDate>
+    <pubDate>Tue, 29 Dec 2020 16:08:30 +0000</pubDate>
+    <lastBuildDate>Tue, 29 Dec 2020 16:08:30 +0000</lastBuildDate>
     <generator>Jekyll v4.1.1</generator>
     
     
@@ -17,7 +17,7 @@
 
 &lt;p&gt;Since 2.0 is a non-LTM release line, and since an LTM release line 
has not yet
 been made available for 2.x, this patch backports critical bug fixes to 2.0 to
-address security bug &lt;a 
href=&quot;https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E&quot;&gt;CVE-2020-17533&lt;/a&gt;
 that could affect any existing 2.0.0
+address security bug &lt;a 
href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533&quot;&gt;CVE-2020-17533&lt;/a&gt;
 that could affect any existing 2.0.0
 users. Users that have already migrated to 2.0.0 are urged to upgrade to 2.0.1
 as soon as possible, and users of 1.10 who wish to upgrade to 2.0 should
 upgrade directly to 2.0.1, bypassing 2.0.0.&lt;/p&gt;
@@ -29,7 +29,7 @@ this list, please &lt;a 
href=&quot;/contact-us&quot;&gt;contact&lt;/a&gt; us to
 &lt;h2 id=&quot;critical-bug-fixes&quot;&gt;Critical Bug Fixes&lt;/h2&gt;
 
 &lt;p&gt;This release includes critical bug fixes to fix security bugs 
identified as
-&lt;a 
href=&quot;https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E&quot;&gt;CVE-2020-17533&lt;/a&gt;:&lt;/p&gt;
+&lt;a 
href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533&quot;&gt;CVE-2020-17533&lt;/a&gt;:&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;a 
href=&quot;https://github.com/apache/accumulo/issues/1828&quot;&gt;#1828&lt;/a&gt;,
 &lt;a 
href=&quot;https://github.com/apache/accumulo/issues/1832&quot;&gt;#1832&lt;/a&gt;
 Throw exceptions when permission checks fail,
@@ -104,14 +104,14 @@ this list, please &lt;a 
href=&quot;/contact-us&quot;&gt;contact&lt;/a&gt; us to
 
 &lt;p&gt;Users of 1.10.0 or earlier are urged to upgrade to 1.10.1 as soon as 
possible,
 as this is a continuation of the 1.10 LTM release line with critical bug fixes
-for security bug &lt;a 
href=&quot;https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E&quot;&gt;CVE-2020-17533&lt;/a&gt;.
 Users are also encouraged to consider
+for security bug &lt;a 
href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533&quot;&gt;CVE-2020-17533&lt;/a&gt;.
 Users are also encouraged to consider
 migrating to a 2.x version when one that is suitable for their needs becomes
 available.&lt;/p&gt;
 
 &lt;h2 id=&quot;critical-bug-fixes&quot;&gt;Critical Bug Fixes&lt;/h2&gt;
 
 &lt;p&gt;This release includes critical bug fixes to fix security bugs 
identified as
-&lt;a 
href=&quot;https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E&quot;&gt;CVE-2020-17533&lt;/a&gt;:&lt;/p&gt;
+&lt;a 
href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533&quot;&gt;CVE-2020-17533&lt;/a&gt;:&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;a 
href=&quot;https://github.com/apache/accumulo/issues/1830&quot;&gt;#1830&lt;/a&gt;,
 &lt;a 
href=&quot;https://github.com/apache/accumulo/issues/1832&quot;&gt;#1832&lt;/a&gt;
 Throw exceptions when permission checks fail,
diff --git a/output/release/accumulo-1.10.1/index.html 
b/output/release/accumulo-1.10.1/index.html
index a8dd068..d6a9d71 100644
--- a/output/release/accumulo-1.10.1/index.html
+++ b/output/release/accumulo-1.10.1/index.html
@@ -171,14 +171,14 @@ this list, please <a href="/contact-us">contact</a> us to 
have it included.</p>
 
 <p>Users of 1.10.0 or earlier are urged to upgrade to 1.10.1 as soon as 
possible,
 as this is a continuation of the 1.10 LTM release line with critical bug fixes
-for security bug <a 
href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E";>CVE-2020-17533</a>.
 Users are also encouraged to consider
+for security bug <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533";>CVE-2020-17533</a>.
 Users are also encouraged to consider
 migrating to a 2.x version when one that is suitable for their needs becomes
 available.</p>
 
 <h2 id="critical-bug-fixes">Critical Bug Fixes</h2>
 
 <p>This release includes critical bug fixes to fix security bugs identified as
-<a 
href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E";>CVE-2020-17533</a>:</p>
+<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533";>CVE-2020-17533</a>:</p>
 
 <ul>
   <li><a href="https://github.com/apache/accumulo/issues/1830";>#1830</a>, <a 
href="https://github.com/apache/accumulo/issues/1832";>#1832</a> Throw 
exceptions when permission checks fail,
diff --git a/output/release/accumulo-2.0.1/index.html 
b/output/release/accumulo-2.0.1/index.html
index 31ec416..d8d48af 100644
--- a/output/release/accumulo-2.0.1/index.html
+++ b/output/release/accumulo-2.0.1/index.html
@@ -163,7 +163,7 @@
 
 <p>Since 2.0 is a non-LTM release line, and since an LTM release line has not 
yet
 been made available for 2.x, this patch backports critical bug fixes to 2.0 to
-address security bug <a 
href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E";>CVE-2020-17533</a>
 that could affect any existing 2.0.0
+address security bug <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533";>CVE-2020-17533</a>
 that could affect any existing 2.0.0
 users. Users that have already migrated to 2.0.0 are urged to upgrade to 2.0.1
 as soon as possible, and users of 1.10 who wish to upgrade to 2.0 should
 upgrade directly to 2.0.1, bypassing 2.0.0.</p>
@@ -175,7 +175,7 @@ this list, please <a href="/contact-us">contact</a> us to 
have it included.</p>
 <h2 id="critical-bug-fixes">Critical Bug Fixes</h2>
 
 <p>This release includes critical bug fixes to fix security bugs identified as
-<a 
href="https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E";>CVE-2020-17533</a>:</p>
+<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17533";>CVE-2020-17533</a>:</p>
 
 <ul>
   <li><a href="https://github.com/apache/accumulo/issues/1828";>#1828</a>, <a 
href="https://github.com/apache/accumulo/issues/1832";>#1832</a> Throw 
exceptions when permission checks fail,

Reply via email to