This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-staging in repository https://gitbox.apache.org/repos/asf/zeppelin-site.git
The following commit(s) were added to refs/heads/asf-staging by this push: new f6de60ca7 Automatic Site Publish by Buildbot f6de60ca7 is described below commit f6de60ca735f07323addfca840cdf07717c4dc9d Author: buildbot <us...@infra.apache.org> AuthorDate: Sun Jul 27 12:50:58 2025 +0000 Automatic Site Publish by Buildbot --- output/atom.xml | 2 +- output/rss.xml | 4 ++-- output/security.html | 10 ++++++++-- 3 files changed, 11 insertions(+), 5 deletions(-) diff --git a/output/atom.xml b/output/atom.xml index d23340861..640bc165b 100644 --- a/output/atom.xml +++ b/output/atom.xml @@ -4,7 +4,7 @@ <title>Apache Zeppelin</title> <link href="http://zeppelin.apache.org/" rel="self"/> <link href="http://zeppelin.apache.org"/> - <updated>2025-07-27T12:46:45+00:00</updated> + <updated>2025-07-27T12:50:47+00:00</updated> <id>http://zeppelin.apache.org</id> <author> <name>The Apache Software Foundation</name> diff --git a/output/rss.xml b/output/rss.xml index da8e6040f..e13452374 100644 --- a/output/rss.xml +++ b/output/rss.xml @@ -5,8 +5,8 @@ <description>Apache Zeppelin - The Apache Software Foundation</description> <link>http://zeppelin.apache.org</link> <link>http://zeppelin.apache.org</link> - <lastBuildDate>2025-07-27T12:46:45+00:00</lastBuildDate> - <pubDate>2025-07-27T12:46:45+00:00</pubDate> + <lastBuildDate>2025-07-27T12:50:47+00:00</lastBuildDate> + <pubDate>2025-07-27T12:50:47+00:00</pubDate> <ttl>1800</ttl> diff --git a/output/security.html b/output/security.html index 0351d4982..aca783dfa 100644 --- a/output/security.html +++ b/output/security.html @@ -234,9 +234,15 @@ executables could potentially be altered for malicious purposes. To mitigate this risk, it's recommended to set the paths to trusted locations for these executables, such as PYTHON and SPARK_HOME.</p> -<h1>Reporting security issues</h1> +<h1>Known Security Issues</h1> -<p>If you have found a potential security issue in Zeppelin, +<p>It is always best to use the latest Apache Zeppelin <a href="https://zeppelin.apache.org/download.html">release</a>. +A good place to check for CVE announcments is the <a href="https://lists.apache.org/list?us...@zeppelin.apache.org">Zeppelin users mailing list</a>. +Many third party sites maintain lists of CVEs by product. One example is <a href="https://app.opencve.io/cve/?vendor=apache&product=zeppelin">OpenCVE</a>.</p> + +<h1>Reporting Security Issues</h1> + +<p>If you have found a potential security issue in Apache Zeppelin, such as a way to bypass the Shiro authentication, we encourage you to report this problem at <a href="mailto:secur...@zeppelin.apache.org">secur...@zeppelin.apache.org</a>.