This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-site in repository https://gitbox.apache.org/repos/asf/mina-site.git
The following commit(s) were added to refs/heads/asf-site by this push: new 49785ee3c Updated site from master (e4e67f47fa4aa2ca3ef0dfdb9d265a3c92665297) 49785ee3c is described below commit 49785ee3c4673243304742669c7e646725999a1b Author: jenkins <bui...@apache.org> AuthorDate: Thu Dec 26 18:50:46 2024 +0000 Updated site from master (e4e67f47fa4aa2ca3ef0dfdb9d265a3c92665297) --- content/index.xml | 2 +- content/mina-project/index.html | 2 +- content/mina-project/index.xml | 2 +- content/mina-project/news.html | 2 +- content/sitemap.xml | 4 ++-- 5 files changed, 6 insertions(+), 6 deletions(-) diff --git a/content/index.xml b/content/index.xml index 6012d415c..5f9cf4f56 100644 --- a/content/index.xml +++ b/content/index.xml @@ -1862,7 +1862,7 @@ Apache MINA is often called: CVE-2024-52046 MINA applications using unbounded deserialization may allow RCE. Affected versions: Apache MINA 2.0 through 2.0.26 Apache MINA 2.1 through 2.1.9 Apache MINA 2.2 through 2.2.3 Description: -The ObjectSerializationDecoder in Apache MINA uses Java’s native deserialization protocol to process incoming serialized data but lacks the necessary security checks and defenses.</description> +The ObjectSerializationDecoder in Apache MINA uses Java native deserialization protocol to process incoming serialized data but lacks the necessary security checks and defenses.</description> </item> <item> diff --git a/content/mina-project/index.html b/content/mina-project/index.html index 4bb3a1778..7ecc598b3 100644 --- a/content/mina-project/index.html +++ b/content/mina-project/index.html @@ -147,7 +147,7 @@ <li>Apache MINA 2.2 through 2.2.3</li> </ul> <p>Description:</p> -<p>The <em>ObjectSerializationDecoder</em> in Apache <strong>MINA</strong> uses Java’s native deserialization protocol to process +<p>The <em>ObjectSerializationDecoder</em> in Apache <strong>MINA</strong> uses <strong>Java</strong> native deserialization protocol to process incoming serialized data but lacks the necessary security checks and defenses. This vulnerability allows attackers to exploit the deserialization process by sending specially crafted malicious serialized data, potentially leading to remote code execution (<strong>RCE</strong>) attacks.</p> diff --git a/content/mina-project/index.xml b/content/mina-project/index.xml index 066f50aa5..e1b55ff74 100644 --- a/content/mina-project/index.xml +++ b/content/mina-project/index.xml @@ -765,7 +765,7 @@ Apache MINA is often called: CVE-2024-52046 MINA applications using unbounded deserialization may allow RCE. Affected versions: Apache MINA 2.0 through 2.0.26 Apache MINA 2.1 through 2.1.9 Apache MINA 2.2 through 2.2.3 Description: -The ObjectSerializationDecoder in Apache MINA uses Java’s native deserialization protocol to process incoming serialized data but lacks the necessary security checks and defenses.</description> +The ObjectSerializationDecoder in Apache MINA uses Java native deserialization protocol to process incoming serialized data but lacks the necessary security checks and defenses.</description> </item> <item> diff --git a/content/mina-project/news.html b/content/mina-project/news.html index 87dbaa62c..01ffa0768 100644 --- a/content/mina-project/news.html +++ b/content/mina-project/news.html @@ -134,7 +134,7 @@ <li>Apache MINA 2.2 through 2.2.3</li> </ul> <p>Description:</p> -<p>The <em>ObjectSerializationDecoder</em> in Apache <strong>MINA</strong> uses Java’s native deserialization protocol to process +<p>The <em>ObjectSerializationDecoder</em> in Apache <strong>MINA</strong> uses <strong>Java</strong> native deserialization protocol to process incoming serialized data but lacks the necessary security checks and defenses. This vulnerability allows attackers to exploit the deserialization process by sending specially crafted malicious serialized data, potentially leading to remote code execution (<strong>RCE</strong>) attacks.</p> diff --git a/content/sitemap.xml b/content/sitemap.xml index 3a44a7cdc..68fb3bf4d 100644 --- a/content/sitemap.xml +++ b/content/sitemap.xml @@ -924,12 +924,12 @@ <url> <loc>https://mina.apache.org/mina-project.html</loc> - <lastmod>2024-12-24T19:23:25+01:00</lastmod> + <lastmod>2024-12-26T19:41:07+01:00</lastmod> </url> <url> <loc>https://mina.apache.org/mina-project/news.html</loc> - <lastmod>2024-12-24T19:23:25+01:00</lastmod> + <lastmod>2024-12-26T19:41:07+01:00</lastmod> </url> <url>