Return-Path: Delivered-To: apmail-cocoon-dev-archive@www.apache.org Received: (qmail 10132 invoked from network); 11 Oct 2009 02:09:04 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 11 Oct 2009 02:09:04 -0000 Received: (qmail 62471 invoked by uid 500); 11 Oct 2009 02:09:03 -0000 Delivered-To: apmail-cocoon-dev-archive@cocoon.apache.org Received: (qmail 62381 invoked by uid 500); 11 Oct 2009 02:09:03 -0000 Mailing-List: contact dev-help@cocoon.apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: List-Post: Reply-To: dev@cocoon.apache.org List-Id: Delivered-To: mailing list dev@cocoon.apache.org Received: (qmail 62373 invoked by uid 99); 11 Oct 2009 02:09:03 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 11 Oct 2009 02:09:03 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.140] (HELO brutus.apache.org) (140.211.11.140) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 11 Oct 2009 02:08:52 +0000 Received: from brutus (localhost [127.0.0.1]) by brutus.apache.org (Postfix) with ESMTP id 669F2234C1EE for ; Sat, 10 Oct 2009 19:08:31 -0700 (PDT) Message-ID: <620073426.1255226911419.JavaMail.jira@brutus> Date: Sat, 10 Oct 2009 19:08:31 -0700 (PDT) From: "Brian Martin (JIRA)" To: dev@cocoon.apache.org Subject: [jira] Commented: (COCOON-2073) Upgrade to dojo 0.4.3 (security fixes!) In-Reply-To: <24197888.1181036185865.JavaMail.jira@brutus> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/COCOON-2073?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12764408#action_12764408 ] Brian Martin commented on COCOON-2073: -------------------------------------- CVE-2007-6726 > Upgrade to dojo 0.4.3 (security fixes!) > --------------------------------------- > > Key: COCOON-2073 > URL: https://issues.apache.org/jira/browse/COCOON-2073 > Project: Cocoon > Issue Type: Improvement > Components: Blocks: Ajax > Affects Versions: 2.1.11, 2.2 > Reporter: Alexander Klimetschek > Assignee: Grzegorz Kossakowski > Fix For: 2.1.11, 2.2 > > > Current ajax block includes dojo 0.4.1. The current release of dojo is 0.4.3 - in 0.4.2 minor improvements were made but 0.4.3 includes security fixes for cross-site scripting attacks and the guys at dojo strongly recommend upgrading. As far as I can see, there should be no compatibility issues with Cocoon's dojo widgets. > http://dojotoolkit.org/releaseNotes/0.4.3 -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.