This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/activemq-website.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new e56e04063 Automatic Site Publish by Buildbot
e56e04063 is described below

commit e56e0406369046918c295334503abdee05478208
Author: buildbot <[email protected]>
AuthorDate: Tue Apr 7 20:50:53 2026 +0000

    Automatic Site Publish by Buildbot
---
 output/security-advisories.data/CVE-2026-34197-announcement.txt | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/output/security-advisories.data/CVE-2026-34197-announcement.txt 
b/output/security-advisories.data/CVE-2026-34197-announcement.txt
index 271e7494d..a87db7c78 100644
--- a/output/security-advisories.data/CVE-2026-34197-announcement.txt
+++ b/output/security-advisories.data/CVE-2026-34197-announcement.txt
@@ -18,7 +18,7 @@ An authenticated attacker can invoke these operations with a 
crafted discovery U
 Because Spring's ResourceXmlApplicationContext instantiates all singleton 
beans before the BrokerService validates the configuration, arbitrary code 
execution occurs on the broker's JVM through bean factory methods such as 
Runtime.exec().
 This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 
6.2.3; Apache ActiveMQ: .
 
-Users are recommended to upgrade to version 5.19.5 or 6.2.3, which fixes the 
issue.
+Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the 
issue.
 
 Credit:
 


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]
For further information, visit: https://activemq.apache.org/contact


Reply via email to