You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@any23.apache.org by "Lewis John McGibbney (JIRA)" <ji...@apache.org> on 2013/06/21 04:30:20 UTC
[jira] [Created] (ANY23-160) [SECURITY] Frame injection
vulnerability in published Javadoc
Lewis John McGibbney created ANY23-160:
------------------------------------------
Summary: [SECURITY] Frame injection vulnerability in published Javadoc
Key: ANY23-160
URL: https://issues.apache.org/jira/browse/ANY23-160
Project: Apache Any23
Issue Type: New Feature
Affects Versions: 0.8.0
Reporter: Lewis John McGibbney
Priority: Blocker
Fix For: 0.9.0
Hi All,
Oracle has announced [1], [2] a frame injection vulnerability in Javadoc
generated by Java 5, Java 6 and Java 7 before update 22.
The infrastructure team has completed a scan of our current project
websites and identified over 6000 instances of vulnerable Javadoc
distributed across most TLPs. The chances are the project(s) you
contribute to is(are) affected. A list of projects and the number of
affected Javadoc instances per project is provided at the end of this
e-mail.
Please take the necessary steps to fix any currently published Javadoc
and to ensure that any future Javadoc published by your project does not
contain the vulnerability. The announcement by Oracle includes a link to
a tool that can be used to fix Javadoc without regeneration.
The infrastructure team is investigating options for preventing the
publication of vulnerable Javadoc.
[1]
http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
[2] http://www.kb.cert.org/vuls/id/225657
any23.apache.org 13
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira