This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/mina-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 49785ee3c Updated site from master 
(e4e67f47fa4aa2ca3ef0dfdb9d265a3c92665297)
49785ee3c is described below

commit 49785ee3c4673243304742669c7e646725999a1b
Author: jenkins <bui...@apache.org>
AuthorDate: Thu Dec 26 18:50:46 2024 +0000

    Updated site from master (e4e67f47fa4aa2ca3ef0dfdb9d265a3c92665297)
---
 content/index.xml               | 2 +-
 content/mina-project/index.html | 2 +-
 content/mina-project/index.xml  | 2 +-
 content/mina-project/news.html  | 2 +-
 content/sitemap.xml             | 4 ++--
 5 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/content/index.xml b/content/index.xml
index 6012d415c..5f9cf4f56 100644
--- a/content/index.xml
+++ b/content/index.xml
@@ -1862,7 +1862,7 @@ Apache MINA is often called:
 CVE-2024-52046 MINA applications using unbounded deserialization may allow RCE.
 Affected versions:
  Apache MINA 2.0 through 2.0.26 Apache MINA 2.1 through 2.1.9 Apache MINA 2.2 
through 2.2.3  Description:
-The ObjectSerializationDecoder in Apache MINA uses Java’s native 
deserialization protocol to process incoming serialized data but lacks the 
necessary security checks and defenses.</description>
+The ObjectSerializationDecoder in Apache MINA uses Java native deserialization 
protocol to process incoming serialized data but lacks the necessary security 
checks and defenses.</description>
     </item>
     
     <item>
diff --git a/content/mina-project/index.html b/content/mina-project/index.html
index 4bb3a1778..7ecc598b3 100644
--- a/content/mina-project/index.html
+++ b/content/mina-project/index.html
@@ -147,7 +147,7 @@
 <li>Apache MINA 2.2 through 2.2.3</li>
 </ul>
 <p>Description:</p>
-<p>The <em>ObjectSerializationDecoder</em> in Apache <strong>MINA</strong> 
uses Java’s native deserialization protocol to process
+<p>The <em>ObjectSerializationDecoder</em> in Apache <strong>MINA</strong> 
uses <strong>Java</strong> native deserialization protocol to process
 incoming serialized data but lacks the necessary security checks and defenses. 
This vulnerability allows
 attackers to exploit the deserialization process by sending specially crafted 
malicious serialized data,
 potentially leading to remote code execution (<strong>RCE</strong>) 
attacks.</p>
diff --git a/content/mina-project/index.xml b/content/mina-project/index.xml
index 066f50aa5..e1b55ff74 100644
--- a/content/mina-project/index.xml
+++ b/content/mina-project/index.xml
@@ -765,7 +765,7 @@ Apache MINA is often called:
 CVE-2024-52046 MINA applications using unbounded deserialization may allow RCE.
 Affected versions:
  Apache MINA 2.0 through 2.0.26 Apache MINA 2.1 through 2.1.9 Apache MINA 2.2 
through 2.2.3  Description:
-The ObjectSerializationDecoder in Apache MINA uses Java’s native 
deserialization protocol to process incoming serialized data but lacks the 
necessary security checks and defenses.</description>
+The ObjectSerializationDecoder in Apache MINA uses Java native deserialization 
protocol to process incoming serialized data but lacks the necessary security 
checks and defenses.</description>
     </item>
     
     <item>
diff --git a/content/mina-project/news.html b/content/mina-project/news.html
index 87dbaa62c..01ffa0768 100644
--- a/content/mina-project/news.html
+++ b/content/mina-project/news.html
@@ -134,7 +134,7 @@
 <li>Apache MINA 2.2 through 2.2.3</li>
 </ul>
 <p>Description:</p>
-<p>The <em>ObjectSerializationDecoder</em> in Apache <strong>MINA</strong> 
uses Java’s native deserialization protocol to process
+<p>The <em>ObjectSerializationDecoder</em> in Apache <strong>MINA</strong> 
uses <strong>Java</strong> native deserialization protocol to process
 incoming serialized data but lacks the necessary security checks and defenses. 
This vulnerability allows
 attackers to exploit the deserialization process by sending specially crafted 
malicious serialized data,
 potentially leading to remote code execution (<strong>RCE</strong>) 
attacks.</p>
diff --git a/content/sitemap.xml b/content/sitemap.xml
index 3a44a7cdc..68fb3bf4d 100644
--- a/content/sitemap.xml
+++ b/content/sitemap.xml
@@ -924,12 +924,12 @@
   
   <url>
     <loc>https://mina.apache.org/mina-project.html</loc>
-    <lastmod>2024-12-24T19:23:25+01:00</lastmod>
+    <lastmod>2024-12-26T19:41:07+01:00</lastmod>
   </url>
   
   <url>
     <loc>https://mina.apache.org/mina-project/news.html</loc>
-    <lastmod>2024-12-24T19:23:25+01:00</lastmod>
+    <lastmod>2024-12-26T19:41:07+01:00</lastmod>
   </url>
   
   <url>

Reply via email to