This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/zeppelin-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 9ce889f45 Automatic Site Publish by Buildbot
9ce889f45 is described below

commit 9ce889f45d1fb8ff893c67cc20eb2e4e1349c450
Author: buildbot <us...@infra.apache.org>
AuthorDate: Sat Feb 17 13:54:40 2024 +0000

    Automatic Site Publish by Buildbot
---
 output/atom.xml      | 2 +-
 output/rss.xml       | 4 ++--
 output/security.html | 8 +++++++-
 3 files changed, 10 insertions(+), 4 deletions(-)

diff --git a/output/atom.xml b/output/atom.xml
index 4d96d5daf..409e307c7 100644
--- a/output/atom.xml
+++ b/output/atom.xml
@@ -4,7 +4,7 @@
  <title>Apache Zeppelin</title>
  <link href="http://zeppelin.apache.org/"; rel="self"/>
  <link href="http://zeppelin.apache.org"/>
- <updated>2024-02-17T13:47:34+00:00</updated>
+ <updated>2024-02-17T13:54:32+00:00</updated>
  <id>http://zeppelin.apache.org</id>
  <author>
    <name>The Apache Software Foundation</name>
diff --git a/output/rss.xml b/output/rss.xml
index 58738e685..a78c62a0f 100644
--- a/output/rss.xml
+++ b/output/rss.xml
@@ -5,8 +5,8 @@
         <description>Apache Zeppelin - The Apache Software 
Foundation</description>
         <link>http://zeppelin.apache.org</link>
         <link>http://zeppelin.apache.org</link>
-        <lastBuildDate>2024-02-17T13:47:34+00:00</lastBuildDate>
-        <pubDate>2024-02-17T13:47:34+00:00</pubDate>
+        <lastBuildDate>2024-02-17T13:54:32+00:00</lastBuildDate>
+        <pubDate>2024-02-17T13:54:32+00:00</pubDate>
         <ttl>1800</ttl>
 
 
diff --git a/output/security.html b/output/security.html
index 55186bdb5..e4869e211 100644
--- a/output/security.html
+++ b/output/security.html
@@ -165,6 +165,12 @@ available to trusted users, and the server on which 
Zeppelin is
 installed does not contain any secrets or have privileges beyond
 those the users are trusted with.</p>
 
+<p>All interpreters should be assumed to be able to access the local 
+shell and execute arbitrary commands with the privileges of the user
+running the Zeppelin server. As generic interpreters such as sh, Groovy,
+Java and Python make this especially trivial, we plan to disable the sh
+interpreter by default from version 0.11.1 onward.</p>
+
 <h3>Zeppelin on Docker</h3>
 
 <p>An exception to the above is when the Zeppelin interpreter
@@ -221,7 +227,7 @@ for each vulnerability you are reporting.</p>
 <ul>
 <li>The reporter reports the vulnerability privately to <a 
href="mailto:secur...@zeppelin.apache.org";>secur...@zeppelin.apache.org</a>.</li>
 <li>The Zeppelin project security team works privately with the reporter to 
resolve the vulnerability.</li>
-<li>The Zeppelin project creates a new release of the package the vulnerabilty 
affects to deliver its fix.</li>
+<li>The Zeppelin project creates a new release of the package the 
vulnerability affects to deliver its fix.</li>
 <li>The Zeppelin project publicly announces the vulnerability and describes 
how to apply the fix.</li>
 </ul>
 

Reply via email to