This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch CVE-2020-11971-amend in repository https://gitbox.apache.org/repos/asf/camel-website.git
commit 2a753f77b336e23ca2d507ff3819580641713e7c Author: Andrea Cosentino <anco...@gmail.com> AuthorDate: Fri May 22 11:27:06 2020 +0200 CVE-2020-11971 - Amended fix version --- content/security/CVE-2020-11971.txt.asc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/content/security/CVE-2020-11971.txt.asc b/content/security/CVE-2020-11971.txt.asc index 942b928..1bf7726 100644 --- a/content/security/CVE-2020-11971.txt.asc +++ b/content/security/CVE-2020-11971.txt.asc @@ -7,11 +7,11 @@ Severity: MEDIUM Vendor: The Apache Software Foundation -Versions Affected: Camel 2.25.0, Camel 3.0.0 to 3.1.0. The unsupported Camel 2.x (2.24 and earlier) versions may be also affected. +Versions Affected: Camel 2.25.x, Camel 3.0.0 to 3.1.0. The unsupported Camel 2.x (2.24 and earlier) versions may be also affected. Description: Apache Camel JMX Rebind Flaw Vulnerability -Mitigation: 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0 The JIRA tickets: https://issues.apache.org/jira/browse/CAMEL-14811 refers to the various commits that resovoled the issue, and have more details. +Mitigation: Users should upgrade to 3.2.0 The JIRA tickets: https://issues.apache.org/jira/browse/CAMEL-14811 refers to the various commits that resovoled the issue, and have more details. Credit: This issue was discovered by Colm O. HEigeartaigh <coheigea at apache dot org> from Apache Software Foundation and Jonathan Gallimore <jonathan dot gallimore at gmail dot com> from Tomitribe -----BEGIN PGP SIGNATURE-----