First published: Fri Feb 14 2025(Updated: )
It was discovered that Apache ActiveMQ incorrectly handled authentication. A remote attacker could possibly use this issue to run arbitrary code. (CVE-2022-41678) It was discovered that Apache ActiveMQ incorrectly handled deserialization. A remote attacker could possibly use this issue to run arbitrary shell commands. (CVE-2023-46604)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/activemq | <5.16.1-1ubuntu0.1 | 5.16.1-1ubuntu0.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libactivemq-java | <5.16.1-1ubuntu0.1 | 5.16.1-1ubuntu0.1 |
Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7268-1 is considered critical due to the potential for remote code execution.
To fix USN-7268-1, upgrade Apache ActiveMQ and libactivemq-java to version 5.16.1-1ubuntu0.1 or later.
The affected software packages are Apache ActiveMQ and libactivemq-java prior to version 5.16.1-1ubuntu0.1.
Anyone using Ubuntu 22.04 with the affected versions of Apache ActiveMQ or libactivemq-java is impacted by USN-7268-1.
Due to USN-7268-1, a remote attacker could execute arbitrary code or exploit deserialization flaws.