Return-Path: X-Original-To: apmail-cayenne-dev-archive@www.apache.org Delivered-To: apmail-cayenne-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id D5C8010EF5 for ; Tue, 9 Jul 2013 20:58:54 +0000 (UTC) Received: (qmail 54541 invoked by uid 500); 9 Jul 2013 20:58:54 -0000 Delivered-To: apmail-cayenne-dev-archive@cayenne.apache.org Received: (qmail 54525 invoked by uid 500); 9 Jul 2013 20:58:54 -0000 Mailing-List: contact dev-help@cayenne.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cayenne.apache.org Delivered-To: mailing list dev@cayenne.apache.org Received: (qmail 54517 invoked by uid 99); 9 Jul 2013 20:58:54 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 09 Jul 2013 20:58:54 +0000 X-ASF-Spam-Status: No, hits=-0.7 required=5.0 tests=RCVD_IN_DNSWL_LOW,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of mkienenb@gmail.com designates 209.85.212.177 as permitted sender) Received: from [209.85.212.177] (HELO mail-wi0-f177.google.com) (209.85.212.177) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 09 Jul 2013 20:58:49 +0000 Received: by mail-wi0-f177.google.com with SMTP id ey16so5585331wid.16 for ; Tue, 09 Jul 2013 13:58:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type; bh=RqhE1MfjG5UZ7zWM4hbNqLGWDkp2cqUvVOQNSN2gKDE=; b=ICWymV95oTr6O9mQ0Ro8wDM3GybHOKgp572bTLzbiFeyEAD85CLaskyScPUpGuFkvw fEviHOofRi7Cqi+SAk9jJ2WqPBQfBeHWMRU2q65UzrsedZwt4CInHvmDuze6M3caUf/U fGmsgD2dWagaE61wSJ8juFu7jb/nfBHPPp8Yy5ZbE2FC1z52moWZ/PBP8QN9ISYwz3n7 GDlLizga1BV2AHT/+JN7/DtdUcJIQiGb6t7OITv4zftHfYW496d544j8y23L2M7ObBva +zxkP7SuqL4O6ql1pskvFMFleBtYf/aoyQZbW6kxRnrf5h1nODtsmEnmS8f781YFM1uD bx2g== X-Received: by 10.180.160.144 with SMTP id xk16mr32944912wib.62.1373403509462; Tue, 09 Jul 2013 13:58:29 -0700 (PDT) MIME-Version: 1.0 Received: by 10.227.196.75 with HTTP; Tue, 9 Jul 2013 13:58:09 -0700 (PDT) In-Reply-To: References: From: Mike Kienenberger Date: Tue, 9 Jul 2013 16:58:09 -0400 Message-ID: Subject: Re: javadoc security flaw To: dev@cayenne.apache.org Content-Type: text/plain; charset=ISO-8859-1 X-Virus-Checked: Checked by ClamAV on apache.org I wasn't able to quickly determine how to detect or exploit this by reviewing the recent security advisories about the issue. Maybe someone else will have more time or better luck spotting the wanted info. http://www.kb.cert.org/vuls/id/225657 http://xforce.iss.net/xforce/xfdb/84715 http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html On Tue, Jul 9, 2013 at 4:23 PM, Andrus Adamchik wrote: > Mike, thanks for the research. Just committed javadoc plugin upgrade to all active branches (CAY-1845). I hope we are all set. (wonder if this can be verified by checking the generated javadocs somehow?) > > Andrus > > On Jul 9, 2013, at 4:20 PM, Mike Kienenberger wrote: > >> LUCENE's issue stated in the comments that the Oracle tool shouldn't >> be used (apparently it can be integrated with maven). It also stated >> that there was a simple way to duplicate the functionality using >> maven, but I didn't immediately see what that was: >> >> Here's the thread it had on that: >> >> https://jira.codehaus.org/browse/MJAVADOC-370?focusedCommentId=327185&page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-327185 >> >> This seems to point to https://issues.apache.org/jira/browse/MPOM-46 >> as one solution later on in the comments >> >> Which seems to be a matter of updating the maven-javadoc-plugin >> version from 2.9 to 2.9.1. Maybe that's all we need as well? If >> not, I'm guessing you could diff the changes between versions 2.9 to >> 2.9.1 and find the solution in a maven environment? >> >> http://svn.apache.org/viewvc/maven/pom/trunk/asf/pom.xml?r1=1497692&r2=1497691&pathrev=1497692 >> >> --- maven/pom/trunk/asf/pom.xml 2013/06/28 09:11:27 1497691 >> +++ maven/pom/trunk/asf/pom.xml 2013/06/28 09:14:58 1497692 >> @@ -184,7 +184,7 @@ >> >> org.apache.maven.plugins >> maven-javadoc-plugin >> - 2.9 >> + 2.9.1 >> >> >> On Tue, Jul 9, 2013 at 9:12 AM, Mike Kienenberger wrote: >>>> On Jul 9, 2013, at 2:57 AM, Aristedes Maniatis wrote: >>>>> Did we change the javadoc build process to avoid the javadoc security flaw recently discovered? I patched the website javadocs, but I'm not sure if we also have to change something in our maven build process or upgrade some plugin. >>> >>> On Tue, Jul 9, 2013 at 2:12 AM, Andrus Adamchik wrote: >>>> Me neither. Probably some research is in order. Should we take this to a separate thread? >>> >>> Maybe you can copy what some other project has done. >>> >>> I saw a notice about it for tomcat but I believe it is built with ant. >>> >>> https://issues.apache.org/bugzilla/show_bug.cgi?id=55119 >>> >>> That notice pointed to Lucene, but it says it was built with ivy. >>> >>> https://issues.apache.org/jira/browse/LUCENE-5072 >>> >>> So I didn't find a pointer to a maven-based fix. >> >