This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/accumulo-website.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 530a6b98 Automatic Site Publish by Buildbot
530a6b98 is described below

commit 530a6b9848409205ef46afa926032dc7774d2294
Author: buildbot <us...@infra.apache.org>
AuthorDate: Tue Jun 20 19:50:14 2023 +0000

    Automatic Site Publish by Buildbot
---
 output/feed.xml                          | 8 ++++----
 output/release/accumulo-2.1.1/index.html | 4 ++--
 output/search_data.json                  | 2 +-
 3 files changed, 7 insertions(+), 7 deletions(-)

diff --git a/output/feed.xml b/output/feed.xml
index afe89e33..8296f900 100644
--- a/output/feed.xml
+++ b/output/feed.xml
@@ -6,8 +6,8 @@
 </description>
     <link>https://accumulo.apache.org/</link>
     <atom:link href="https://accumulo.apache.org/feed.xml"; rel="self" 
type="application/rss+xml"/>
-    <pubDate>Tue, 20 Jun 2023 19:16:25 +0000</pubDate>
-    <lastBuildDate>Tue, 20 Jun 2023 19:16:25 +0000</lastBuildDate>
+    <pubDate>Tue, 20 Jun 2023 19:50:07 +0000</pubDate>
+    <lastBuildDate>Tue, 20 Jun 2023 19:50:07 +0000</lastBuildDate>
     <generator>Jekyll v4.3.1</generator>
     
     
@@ -32,8 +32,8 @@ that occurred in 1.10.3 and earlier.&lt;/p&gt;
 &lt;h3 id=&quot;critical-fixes&quot;&gt;Critical Fixes&lt;/h3&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;Fixed a critical issue that improperly allowed a user under some 
conditions
-to authenticate to Accumulo using an invalid password.&lt;/li&gt;
+  &lt;li&gt;&lt;a 
href=&quot;https://www.cve.org/CVERecord?id=CVE-2023-34340&quot;&gt;CVE-2023-34340&lt;/a&gt;
 Fixed a critical issue that improperly allowed a user under
+some conditions to authenticate to Accumulo using an invalid 
password.&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;h3 id=&quot;notable-improvements&quot;&gt;Notable Improvements&lt;/h3&gt;
diff --git a/output/release/accumulo-2.1.1/index.html 
b/output/release/accumulo-2.1.1/index.html
index 2f19b04c..253ab687 100644
--- a/output/release/accumulo-2.1.1/index.html
+++ b/output/release/accumulo-2.1.1/index.html
@@ -182,8 +182,8 @@ that occurred in 1.10.3 and earlier.</p>
 <h3 id="critical-fixes">Critical Fixes</h3>
 
 <ul>
-  <li>Fixed a critical issue that improperly allowed a user under some 
conditions
-to authenticate to Accumulo using an invalid password.</li>
+  <li><a 
href="https://www.cve.org/CVERecord?id=CVE-2023-34340";>CVE-2023-34340</a> Fixed 
a critical issue that improperly allowed a user under
+some conditions to authenticate to Accumulo using an invalid password.</li>
 </ul>
 
 <h3 id="notable-improvements">Notable Improvements</h3>
diff --git a/output/search_data.json b/output/search_data.json
index a944599e..b3583390 100644
--- a/output/search_data.json
+++ b/output/search_data.json
@@ -318,7 +318,7 @@
   
     "release-accumulo-2-1-1": {
       "title": "Apache Accumulo 2.1.1",
-      "content": "AboutApache Accumulo 2.1.1 is a patch release of the 2.1.0 
LTM line. It containsmany bug fixes and minor enhancements, including a 
critical fix. This versionsupersedes 2.1.0. Users upgrading to 2.1 should 
upgrade directly to thisversion instead of 2.1.0.Included here are some 
highlights of the most interesting bugs and featuresfixed in 2.1.1. Several 
trivial bugs were also fixed that related to thepresentation of information on 
the monitor, or to avoid spammy/excessivel [...]
+      "content": "AboutApache Accumulo 2.1.1 is a patch release of the 2.1.0 
LTM line. It containsmany bug fixes and minor enhancements, including a 
critical fix. This versionsupersedes 2.1.0. Users upgrading to 2.1 should 
upgrade directly to thisversion instead of 2.1.0.Included here are some 
highlights of the most interesting bugs and featuresfixed in 2.1.1. Several 
trivial bugs were also fixed that related to thepresentation of information on 
the monitor, or to avoid spammy/excessivel [...]
       "url": " /release/accumulo-2.1.1/",
       "categories": "release"
     }

Reply via email to