This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/zeppelin-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new f6de60ca7 Automatic Site Publish by Buildbot
f6de60ca7 is described below

commit f6de60ca735f07323addfca840cdf07717c4dc9d
Author: buildbot <us...@infra.apache.org>
AuthorDate: Sun Jul 27 12:50:58 2025 +0000

    Automatic Site Publish by Buildbot
---
 output/atom.xml      |  2 +-
 output/rss.xml       |  4 ++--
 output/security.html | 10 ++++++++--
 3 files changed, 11 insertions(+), 5 deletions(-)

diff --git a/output/atom.xml b/output/atom.xml
index d23340861..640bc165b 100644
--- a/output/atom.xml
+++ b/output/atom.xml
@@ -4,7 +4,7 @@
  <title>Apache Zeppelin</title>
  <link href="http://zeppelin.apache.org/"; rel="self"/>
  <link href="http://zeppelin.apache.org"/>
- <updated>2025-07-27T12:46:45+00:00</updated>
+ <updated>2025-07-27T12:50:47+00:00</updated>
  <id>http://zeppelin.apache.org</id>
  <author>
    <name>The Apache Software Foundation</name>
diff --git a/output/rss.xml b/output/rss.xml
index da8e6040f..e13452374 100644
--- a/output/rss.xml
+++ b/output/rss.xml
@@ -5,8 +5,8 @@
         <description>Apache Zeppelin - The Apache Software 
Foundation</description>
         <link>http://zeppelin.apache.org</link>
         <link>http://zeppelin.apache.org</link>
-        <lastBuildDate>2025-07-27T12:46:45+00:00</lastBuildDate>
-        <pubDate>2025-07-27T12:46:45+00:00</pubDate>
+        <lastBuildDate>2025-07-27T12:50:47+00:00</lastBuildDate>
+        <pubDate>2025-07-27T12:50:47+00:00</pubDate>
         <ttl>1800</ttl>
 
 
diff --git a/output/security.html b/output/security.html
index 0351d4982..aca783dfa 100644
--- a/output/security.html
+++ b/output/security.html
@@ -234,9 +234,15 @@ executables could potentially be altered for malicious 
purposes.
 To mitigate this risk, it&#39;s recommended to set the paths to trusted
 locations for these executables, such as PYTHON and SPARK_HOME.</p>
 
-<h1>Reporting security issues</h1>
+<h1>Known Security Issues</h1>
 
-<p>If you have found a potential security issue in Zeppelin,
+<p>It is always best to use the latest Apache Zeppelin <a 
href="https://zeppelin.apache.org/download.html";>release</a>.
+A good place to check for CVE announcments is the <a 
href="https://lists.apache.org/list?us...@zeppelin.apache.org";>Zeppelin users 
mailing list</a>.
+Many third party sites maintain lists of CVEs by product. One example is <a 
href="https://app.opencve.io/cve/?vendor=apache&product=zeppelin";>OpenCVE</a>.</p>
+
+<h1>Reporting Security Issues</h1>
+
+<p>If you have found a potential security issue in Apache Zeppelin,
 such as a way to bypass the Shiro authentication,
 we encourage you to report this problem at
 <a href="mailto:secur...@zeppelin.apache.org";>secur...@zeppelin.apache.org</a>.

Reply via email to