This is an automated email from the ASF dual-hosted git repository.
git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/activemq-website.git
The following commit(s) were added to refs/heads/asf-site by this push:
new e56e04063 Automatic Site Publish by Buildbot
e56e04063 is described below
commit e56e0406369046918c295334503abdee05478208
Author: buildbot <[email protected]>
AuthorDate: Tue Apr 7 20:50:53 2026 +0000
Automatic Site Publish by Buildbot
---
output/security-advisories.data/CVE-2026-34197-announcement.txt | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/output/security-advisories.data/CVE-2026-34197-announcement.txt
b/output/security-advisories.data/CVE-2026-34197-announcement.txt
index 271e7494d..a87db7c78 100644
--- a/output/security-advisories.data/CVE-2026-34197-announcement.txt
+++ b/output/security-advisories.data/CVE-2026-34197-announcement.txt
@@ -18,7 +18,7 @@ An authenticated attacker can invoke these operations with a
crafted discovery U
Because Spring's ResourceXmlApplicationContext instantiates all singleton
beans before the BrokerService validates the configuration, arbitrary code
execution occurs on the broker's JVM through bean factory methods such as
Runtime.exec().
This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before
6.2.3; Apache ActiveMQ: .
-Users are recommended to upgrade to version 5.19.5 or 6.2.3, which fixes the
issue.
+Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the
issue.
Credit:
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]
For further information, visit: https://activemq.apache.org/contact