You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@activemq.apache.org by cl...@apache.org on 2019/10/21 22:35:30 UTC

[activemq-website] branch master updated (c6d1c03 -> 96f0b62)

This is an automated email from the ASF dual-hosted git repository.

clebertsuconic pushed a change to branch master
in repository https://gitbox.apache.org/repos/asf/activemq-website.git.


    from c6d1c03  Merge pull request #17 from coheigea/advisories_ordering
     new 561ecfa  Changing security.md to reflect chagnes performed on PR #17
     new 96f0b62  Adding a big warning on README to avoid the issue that happened on #17

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 README.md                          | 7 +++++++
 src/components/classic/security.md | 4 ++--
 2 files changed, 9 insertions(+), 2 deletions(-)


[activemq-website] 02/02: Adding a big warning on README to avoid the issue that happened on #17

Posted by cl...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

clebertsuconic pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/activemq-website.git

commit 96f0b625cffb3645ae49dd5f43b0929da820c549
Author: Clebert Suconic <cl...@apache.org>
AuthorDate: Mon Oct 21 18:27:50 2019 -0400

    Adding a big warning on README to avoid the issue that happened on #17
---
 README.md | 7 +++++++
 1 file changed, 7 insertions(+)

diff --git a/README.md b/README.md
index 05461ec..2f2e300 100644
--- a/README.md
+++ b/README.md
@@ -3,6 +3,13 @@ Apache ActiveMQ Website
 
 This is the repository for the Apache ActiveMQ website, hosted at [activemq.apache.org](http://activemq.apache.org/).
 
+*Warning*
+-------
+
+Do not change **anything** under ./content directly.
+This website is using [Jekyll](https://jekyllrb.com/), and the ./src will generate the ./content output.
+Please read it through this README before you contribute!
+
 How it works
 ------------
 The `master` branch of this repo contains the source files that are used to generate the HTML that ultimately gets pushed to the site, along with


[activemq-website] 01/02: Changing security.md to reflect chagnes performed on PR #17

Posted by cl...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

clebertsuconic pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/activemq-website.git

commit 561ecfa16c1145ef0977e5fa432e524d21076dba
Author: Clebert Suconic <cl...@apache.org>
AuthorDate: Mon Oct 21 18:27:33 2019 -0400

    Changing security.md to reflect chagnes performed on PR #17
---
 src/components/classic/security.md | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/src/components/classic/security.md b/src/components/classic/security.md
index c6996f1..4f154b0 100644
--- a/src/components/classic/security.md
+++ b/src/components/classic/security.md
@@ -14,11 +14,10 @@ See the main [Security Advisories](../../security-advisories) page for details f
 
 #### 2018
 *   [CVE-2018-8006](../../security-advisories.data/CVE-2018-8006-announcement.txt) - ActiveMQ Web Console - Cross-Site Scripting
-*   [CVE-2017-15709](../../security-advisories.data/CVE-2017-15709-announcement.txt) - Information Leak
 *   [CVE-2018-11775](../../security-advisories.data/CVE-2018-11775-announcement.txt) - Missing TLS Hostname Verification
 
 #### 2017
-*   [CVE-2015-7559](../../security-advisories.data/CVE-2015-7559-announcement.txt) - DoS in client via shutdown command
+*   [CVE-2017-15709](../../security-advisories.data/CVE-2017-15709-announcement.txt) - Information Leak
 
 #### 2016
 *   [CVE-2016-6810](../../security-advisories.data/CVE-2016-6810-announcement.txt) - ActiveMQ Web Console - Cross-Site Scripting
@@ -27,6 +26,7 @@ See the main [Security Advisories](../../security-advisories) page for details f
 *   [CVE-2016-3088](../../security-advisories.data/CVE-2016-3088-announcement.txt) - ActiveMQ Fileserver web application vulnerabilities
 
 #### 2015
+*   [CVE-2015-7559](../../security-advisories.data/CVE-2015-7559-announcement.txt) - DoS in client via shutdown command
 *   [CVE-2015-5254](../../security-advisories.data/CVE-2015-5254-announcement.txt) - Unsafe deserialization in ActiveMQ
 *   [CVE-2015-1830](../../security-advisories.data/CVE-2015-1830-announcement.txt) - Path traversal leading to unauthenticated RCE in ActiveMQ