This is an automated email from the ASF dual-hosted git repository.

cshannon pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/activemq-website.git


The following commit(s) were added to refs/heads/main by this push:
     new f6afaeb71 Fix version in CVE post
f6afaeb71 is described below

commit f6afaeb71bba41c4160eeeca78653be74d72b9d9
Author: Christopher L. Shannon <[email protected]>
AuthorDate: Tue Apr 7 16:49:35 2026 -0400

    Fix version in CVE post
---
 src/security-advisories.data/CVE-2026-34197-announcement.txt | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/security-advisories.data/CVE-2026-34197-announcement.txt 
b/src/security-advisories.data/CVE-2026-34197-announcement.txt
index 271e7494d..a87db7c78 100644
--- a/src/security-advisories.data/CVE-2026-34197-announcement.txt
+++ b/src/security-advisories.data/CVE-2026-34197-announcement.txt
@@ -18,7 +18,7 @@ An authenticated attacker can invoke these operations with a 
crafted discovery U
 Because Spring's ResourceXmlApplicationContext instantiates all singleton 
beans before the BrokerService validates the configuration, arbitrary code 
execution occurs on the broker's JVM through bean factory methods such as 
Runtime.exec().
 This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 
6.2.3; Apache ActiveMQ: .
 
-Users are recommended to upgrade to version 5.19.5 or 6.2.3, which fixes the 
issue.
+Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the 
issue.
 
 Credit:
 


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]
For further information, visit: https://activemq.apache.org/contact


Reply via email to