This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch CVE-2020-11971-amend in repository https://gitbox.apache.org/repos/asf/camel-website.git
commit c9157e8a22248be02975123e7254ebdf2f2340ca Author: Andrea Cosentino <anco...@gmail.com> AuthorDate: Fri May 22 11:25:36 2020 +0200 CVE-2020-11971 - Amend the fix version --- content/security/CVE-2020-11971.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/content/security/CVE-2020-11971.md b/content/security/CVE-2020-11971.md index 7edfe5c..ae96940 100644 --- a/content/security/CVE-2020-11971.md +++ b/content/security/CVE-2020-11971.md @@ -8,10 +8,10 @@ cve: CVE-2020-11971 severity: MEDIUM summary: "Apache Camel JMX Rebind Flaw Vulnerability" description: "Apache Camel JMX Rebind Flaw Vulnerability" -mitigation: "2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0" +mitigation: "Users should upgrade to 3.2.0" credit: "This issue was discovered by Colm O. HEigeartaigh <coheigea at apache dot org> from Apache Software Foundation and Jonathan Gallimore <jonathan dot gallimore at gmail dot com> from Tomitribe" -affected: 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 -fixed: 2.25.1, 3.2.0 +affected: 2.22.x, 2.23.x, 2.24.x, 2.25.x, 3.0.0 up to 3.1.0 +fixed: 3.2.0 --- The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-14811 refers to the various commits that resovoled the issue, and have more details.