This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch CVE-2020-11971-amend
in repository https://gitbox.apache.org/repos/asf/camel-website.git

commit 2a753f77b336e23ca2d507ff3819580641713e7c
Author: Andrea Cosentino <anco...@gmail.com>
AuthorDate: Fri May 22 11:27:06 2020 +0200

    CVE-2020-11971 - Amended fix version
---
 content/security/CVE-2020-11971.txt.asc | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/content/security/CVE-2020-11971.txt.asc 
b/content/security/CVE-2020-11971.txt.asc
index 942b928..1bf7726 100644
--- a/content/security/CVE-2020-11971.txt.asc
+++ b/content/security/CVE-2020-11971.txt.asc
@@ -7,11 +7,11 @@ Severity: MEDIUM
 
 Vendor: The Apache Software Foundation
 
-Versions Affected: Camel 2.25.0, Camel 3.0.0 to 3.1.0. The unsupported Camel 
2.x (2.24 and earlier) versions may be also affected.
+Versions Affected: Camel 2.25.x, Camel 3.0.0 to 3.1.0. The unsupported Camel 
2.x (2.24 and earlier) versions may be also affected.
 
 Description: Apache Camel JMX Rebind Flaw Vulnerability
 
-Mitigation: 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 
3.2.0 The JIRA tickets: https://issues.apache.org/jira/browse/CAMEL-14811 
refers to the various commits that resovoled the issue, and have more details.
+Mitigation: Users should upgrade to 3.2.0 The JIRA tickets: 
https://issues.apache.org/jira/browse/CAMEL-14811 refers to the various commits 
that resovoled the issue, and have more details.
 
 Credit: This issue was discovered by Colm O. HEigeartaigh <coheigea at apache 
dot org> from Apache Software Foundation and Jonathan Gallimore <jonathan dot 
gallimore at gmail dot com> from Tomitribe
 -----BEGIN PGP SIGNATURE-----

Reply via email to