This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/activemq-website.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 5fb2df4c9 Automatic Site Publish by Buildbot
5fb2df4c9 is described below

commit 5fb2df4c9da522914c6a344d7ad40e6debeb544c
Author: buildbot <[email protected]>
AuthorDate: Thu Apr 9 12:54:38 2026 +0000

    Automatic Site Publish by Buildbot
---
 .../CVE-2025-66168-announcement.txt                | 10 ++++++++
 .../CVE-2026-39304-announcement.txt                | 28 ++++++++++++++++++++++
 .../CVE-2026-40046-announcement.txt                | 27 +++++++++++++++++++++
 3 files changed, 65 insertions(+)

diff --git a/output/security-advisories.data/CVE-2025-66168-announcement.txt 
b/output/security-advisories.data/CVE-2025-66168-announcement.txt
index de9d276f3..05c46b919 100644
--- a/output/security-advisories.data/CVE-2025-66168-announcement.txt
+++ b/output/security-advisories.data/CVE-2025-66168-announcement.txt
@@ -1,3 +1,13 @@
+WARNING:
+
+Users of 6.x should upgrade to 6.2.4 or later as the fix was missed in 
previous 6.x releases.
+
+See the following for more details:
+https://activemq.apache.org/security-advisories.data/CVE-2026-40046-announcement.txt
+https://www.cve.org/CVERecord?id=CVE-2026-40046
+
+Original CVE report:
+
 Affected versions:
 
 - Apache ActiveMQ (org.apache.activemq:apache-activemq) before 5.19.2
diff --git a/output/security-advisories.data/CVE-2026-39304-announcement.txt 
b/output/security-advisories.data/CVE-2026-39304-announcement.txt
new file mode 100644
index 000000000..70192f541
--- /dev/null
+++ b/output/security-advisories.data/CVE-2026-39304-announcement.txt
@@ -0,0 +1,28 @@
+Severity: important
+
+Affected versions:
+
+- Apache ActiveMQ Client (org.apache.activemq:activemq-client) before 5.19.4
+- Apache ActiveMQ Client (org.apache.activemq:activemq-client) 6.0.0 before 
6.2.4
+- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) before 5.19.4
+- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) 6.0.0 before 
6.2.4
+- Apache ActiveMQ All (org.apache.activemq:activemq-all) before 5.19.4
+- Apache ActiveMQ All (org.apache.activemq:activemq-all) 6.0.0 before 6.2.4
+- Apache ActiveMQ (org.apache.activemq:apache-activemq) before 5.19.4
+- Apache ActiveMQ (org.apache.activemq:apache-activemq) 6.0.0 before 6.2.4
+
+Description:
+
+Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, 
Apache ActiveMQ Broker, Apache ActiveMQ.
+
+ActiveMQ NIO SSL transports do not correctly handle TLSv1.3 handshake 
KeyUpdates triggered by clients. This makes it possible for a client to rapidly 
trigger updates which causes the broker to exhaust all its memory in the SSL 
engine leading to DoS.
+
+Note: TLS versions before TLSv1.3 (such as TLSv1.2) are broken but are not 
vulnerable to OOM. Previous TLS versions require a full handshake renegotiation 
which causes a connection to hang but not OOM. This is fixed as well.
+This issue affects Apache ActiveMQ Client: before 5.19.4, from 6.0.0 before 
6.2.4; Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.4; Apache 
ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.4.
+
+Users are recommended to upgrade to version 6.2.4 or 5.19.5, which fixes the 
issue.
+
+References:
+
+https://activemq.apache.org/
+https://www.cve.org/CVERecord?id=CVE-2026-39304
diff --git a/output/security-advisories.data/CVE-2026-40046-announcement.txt 
b/output/security-advisories.data/CVE-2026-40046-announcement.txt
new file mode 100644
index 000000000..a5d889d0f
--- /dev/null
+++ b/output/security-advisories.data/CVE-2026-40046-announcement.txt
@@ -0,0 +1,27 @@
+Severity: moderate
+
+Affected versions:
+
+- Apache ActiveMQ (org.apache.activemq:apache-activemq) 6.0.0 before 6.2.4
+- Apache ActiveMQ All (org.apache.activemq:activemq-all) 6.0.0 before 6.2.4
+- Apache ActiveMQ MQTT (org.apache.activemq:activemq-mqtt) 6.0.0 before 6.2.4
+
+Description:
+
+Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache 
ActiveMQ All, Apache ActiveMQ MQTT.
+
+The fix for "CVE-2025-66168: MQTT control packet remaining length field is not 
properly validated" was only applied to 5.19.2 (and future 5.19.x) releases but 
was missed for all 6.0.0+ versions.
+
+This issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ 
All: from 6.0.0 before 6.2.4; Apache ActiveMQ MQTT: from 6.0.0 before 6.2.4.
+
+Users are recommended to upgrade to version 6.2.4 or a 5.19.x version starting 
with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue.
+
+Credit:
+
+Adrien Bernard (finder)
+
+References:
+
+https://www.cve.org/CVERecord?id=CVE-2025-66168
+https://activemq.apache.org/
+https://www.cve.org/CVERecord?id=CVE-2026-40046


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]
For further information, visit: https://activemq.apache.org/contact


Reply via email to