This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch CVE-2020-11971-amend
in repository https://gitbox.apache.org/repos/asf/camel-website.git

commit c9157e8a22248be02975123e7254ebdf2f2340ca
Author: Andrea Cosentino <anco...@gmail.com>
AuthorDate: Fri May 22 11:25:36 2020 +0200

    CVE-2020-11971 - Amend the fix version
---
 content/security/CVE-2020-11971.md | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/content/security/CVE-2020-11971.md 
b/content/security/CVE-2020-11971.md
index 7edfe5c..ae96940 100644
--- a/content/security/CVE-2020-11971.md
+++ b/content/security/CVE-2020-11971.md
@@ -8,10 +8,10 @@ cve: CVE-2020-11971
 severity: MEDIUM
 summary: "Apache Camel JMX Rebind Flaw Vulnerability"
 description: "Apache Camel JMX Rebind Flaw Vulnerability"
-mitigation: "2.x users should upgrade to 2.25.1, 3.x users should upgrade to 
3.2.0"
+mitigation: "Users should upgrade to 3.2.0"
 credit: "This issue was discovered by Colm O. HEigeartaigh <coheigea at apache 
dot org> from Apache Software Foundation and Jonathan Gallimore <jonathan dot 
gallimore at gmail dot com> from Tomitribe"
-affected: 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0
-fixed: 2.25.1, 3.2.0
+affected: 2.22.x, 2.23.x, 2.24.x, 2.25.x, 3.0.0 up to 3.1.0
+fixed: 3.2.0
 ---
 
 The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-14811 refers to 
the various commits that resovoled the issue, and have more details.

Reply via email to