This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-site in repository https://gitbox.apache.org/repos/asf/struts-site.git
The following commit(s) were added to refs/heads/asf-site by this push: new caf8da3 Automatic Site Publish by Buildbot caf8da3 is described below commit caf8da3a7d15600dc8beae4e0d563e1a6e4b2fb6 Author: buildbot <us...@infra.apache.org> AuthorDate: Fri Dec 17 17:52:34 2021 +0000 Automatic Site Publish by Buildbot --- output/index.html | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/output/index.html b/output/index.html index de6f5b9..7717011 100644 --- a/output/index.html +++ b/output/index.html @@ -152,12 +152,12 @@ <a href="https://cwiki.apache.org/confluence/display/WW/Version+Notes+2.5.28.1">Version notes</a> </div> <div class="column col-md-4"> - <h2>Security Advice on Log4j 2.15.0</h2> + <h2>Security Advice on Log4j 2.12.2/2.16.0</h2> <p> The Apache Struts Security team would like to announce that all the users using - the latest Struts 2.5.x series should upgrade Log4j library to the - latest 2.15.0 version which addresses the Remote-Code-Execution - vulnerability - CVE-2021-44228. . + the latest Struts 2.5.x series should either upgrade to Apache Struts 2.5.28.1 which + uses Log4j 2.12.2 version that addresses <a href="https://logging.apache.org/log4j/2.x/security.html#CVE-2021-45046">CVE-2021-45046</a> + or upgrade Log4j to version 2.12.2 (when running on Java 1.7) or 2.16.0 (when running on Java 8+). Read more in <a href="announce-2021#a20211212-2">Announcement</a> </p> </div>