[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-23 Thread Uwe Schindler (ASF) (JIRA)

[ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=327187#comment-327187
 ] 

Uwe Schindler (ASF) commented on MJAVADOC-370:
--

[~olamy]: For sure I can propose a fix to add charsets to Oracle's tool in the 
github project. But my main suggestion here is to *not use the original Oracle 
tool at all*, because the whole stuff it does can be done with a few lines of 
higher-level code in Maven already (using DirectoryScanner and plexus-utils 
search/replace in files).

> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-23 Thread Uwe Schindler (ASF) (JIRA)

[ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=327190#comment-327190
 ] 

Uwe Schindler (ASF) commented on MJAVADOC-370:
--

bq. I agree that the Oracle tool is looking less and less useful as a means of 
patching the files; it should probably only be used in check mode (assuming 
that the encoding issue does not cause problems there as well).

The check mode is just a grep with a little little bit more logic that can be 
done in one shell line :-) In my opinion, Oracle's code is buggy-to-hell? and 
is more a poorly implemented patch & grep tool. *Don't use it! Fix it by 
reimplementing with higher level tools from plexus-utils!*

> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-23 Thread Uwe Schindler (ASF) (JIRA)

[ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=327193#comment-327193
 ] 

Uwe Schindler (ASF) commented on MJAVADOC-370:
--

No official Javadoc tool before the bugfix release has the url length bug. The 
bug was introduced by the first fixup tool and early openjdk commits (see 
commits on Oracle's HG). And its not a security relevant bug, it just breaks 
the javascript from working correctly. So they fix the fix.

> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-23 Thread Uwe Schindler (ASF) (JIRA)

[ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=327194#comment-327194
 ] 

Uwe Schindler (ASF) commented on MJAVADOC-370:
--

But I agree, you could aldo do the hotfix, if you like. But the original Oracle 
patch code does this only under special conditions: validURL(url) function 
found in code (so already a patched variant).

On our LUCENE issue I am currently investigating what the fixup tool does with 
non-Oracle-JDK JDK's: IBM J9 and Oracle JRockit. If they both are also 
vulnerabe, the tool in Maven/Ant should also fix the bugs in them correctly.

> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-23 Thread Uwe Schindler (ASF) (JIRA)

 [ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Uwe Schindler (ASF) updated MJAVADOC-370:
-

Attachment: MJAVADOC-370.patch

Attached is my quick fix thats directly included into the javadoc maven Mojo.

The abstract base class calls an additional patcher class directly after 
invoking Javadoc shell command. The patching code is in a separate class at the 
moment. It has almost nothing to do anymore with Oracle's original fix. It uses 
FileUtils and StringUtils and DirectoryScanner from Plexus to do all patching, 
respecting the output charset of the javadoc ran before.

The only part that was taken from Oracle's file was the "patch data" (the 
javadoc to replace). As this javadoc is in every published Javadoc file I 
assume it is public domain. At least the license of the Javascript code is 
*not* the same like the Oracle patch tool, because it is string data only.

I was not able to add a test, but from what I see after running tests:
- If I run (mvn test) using a vulnerable JDK, the files are patched correctly 
(see test output directory) and the tests display a corresponding log line
- If I run with JDK 1.7.0u25, the patches are not applied and no additional log 
lines appear when running tests.

I hope this patch may function as a start of integrating this into Maven's main 
javadoc plugin. I am no Maven developer (I love Ant too much), but hopefully 
the code is fine!

> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
> Attachments: MJAVADOC-370.patch
>
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-23 Thread Uwe Schindler (ASF) (JIRA)

[ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=327199#comment-327199
 ] 

Uwe Schindler (ASF) edited comment on MJAVADOC-370 at 6/23/13 10:19 AM:


Attached is my quick fix thats directly included into the javadoc maven Mojo.

The abstract base class calls an additional patcher class directly after 
invoking Javadoc shell command. The patching code is in a separate class at the 
moment. It has almost nothing to do anymore with Oracle's original fix. It uses 
FileUtils and StringUtils and DirectoryScanner from Plexus to do all patching, 
respecting the output charset of the javadoc ran before.

The only part that was taken from Oracle's file was the "patch data" (the 
script data to replace). As this script data is in every published Javadoc file 
I assume it is public domain. At least the license of the Javascript code is 
*not* the same like the Oracle patch tool, because it is string data only.

I was not able to add a test, but from what I see after running tests:
- If I run (mvn test) using a vulnerable JDK, the files are patched correctly 
(see test output directory) and the tests display a corresponding log line
- If I run with JDK 1.7.0u25, the patches are not applied and no additional log 
lines appear when running tests.

I hope this patch may function as a start of integrating this into Maven's main 
javadoc plugin. I am no Maven developer (I love Ant too much), but hopefully 
the code is fine!

  was (Author: thetaphi):
Attached is my quick fix thats directly included into the javadoc maven 
Mojo.

The abstract base class calls an additional patcher class directly after 
invoking Javadoc shell command. The patching code is in a separate class at the 
moment. It has almost nothing to do anymore with Oracle's original fix. It uses 
FileUtils and StringUtils and DirectoryScanner from Plexus to do all patching, 
respecting the output charset of the javadoc ran before.

The only part that was taken from Oracle's file was the "patch data" (the 
javadoc to replace). As this javadoc is in every published Javadoc file I 
assume it is public domain. At least the license of the Javascript code is 
*not* the same like the Oracle patch tool, because it is string data only.

I was not able to add a test, but from what I see after running tests:
- If I run (mvn test) using a vulnerable JDK, the files are patched correctly 
(see test output directory) and the tests display a corresponding log line
- If I run with JDK 1.7.0u25, the patches are not applied and no additional log 
lines appear when running tests.

I hope this patch may function as a start of integrating this into Maven's main 
javadoc plugin. I am no Maven developer (I love Ant too much), but hopefully 
the code is fine!
  
> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
> Attachments: MJAVADOC-370.patch
>
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-23 Thread Uwe Schindler (ASF) (JIRA)

[ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=327201#comment-327201
 ] 

Uwe Schindler (ASF) commented on MJAVADOC-370:
--

To conclude:
- I tested with JDK 1.5.0_22 -> patch applied correctly
- I tested with JDK 1.6.0_32 -> patch applied correctly
- I tested with JDK 1.7.0_21 -> patch applied correctly
- I tested with JDK 1.7.0_25 -> no patching done at all (not vulnerable)
- I tested with JDK 1.8.0-ea-b91 (still vulnerable build) -> patch applied 
correctly (tests still failed, but that's a preexisting JDK8 bug)

> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
> Attachments: MJAVADOC-370.patch
>
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-23 Thread Uwe Schindler (ASF) (JIRA)

 [ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Uwe Schindler (ASF) updated MJAVADOC-370:
-

Attachment: MJAVADOC-370.patch

Slightly improved patch (removed the encoding null checks as FileUtils does it 
for us, i use the "official file name pattern" from the patcher now)

> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
> Attachments: MJAVADOC-370.patch, MJAVADOC-370.patch
>
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-23 Thread Uwe Schindler (ASF) (JIRA)

 [ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Uwe Schindler (ASF) updated MJAVADOC-370:
-

Attachment: MJAVADOC-370.patch

A new patch that uses the Javascript code as copied out of an index file as 
patched by Oracle's tool. The replacement code is in a resource now as plain 
text (US-ASCII encoded) and loaded before patching.

> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
> Attachments: MJAVADOC-370.patch, MJAVADOC-370.patch, 
> MJAVADOC-370.patch
>
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-23 Thread Uwe Schindler (ASF) (JIRA)

 [ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Uwe Schindler (ASF) updated MJAVADOC-370:
-

Attachment: MJAVADOC-370.patch

I streamlined the patch a bit more and removed the separate class.

The code pathing the javadocs output is now in AbstractJavadocMojo, the patch 
data ina resource file (encoded as US-ASCII). This is now easy to understand.

Currently there is no Mojo @Parameter to disable the patching, maybe we should 
add it.

I will report back once I tested with non-Oracle JDK if the patch is really 
safe for all types of Javadocs (JRockit, IBM J9). If not we should add some 
detection for Orcale/Sun/OpenJDK's JDKs and only patch Javadocs generated by 
their doclet (or only patch the default doclet?).

> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
> Attachments: MJAVADOC-370.patch, MJAVADOC-370.patch, 
> MJAVADOC-370.patch, MJAVADOC-370.patch
>
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-23 Thread Uwe Schindler (ASF) (JIRA)

[ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=327207#comment-327207
 ] 

Uwe Schindler (ASF) edited comment on MJAVADOC-370 at 6/23/13 4:35 PM:
---

I streamlined the patch a bit more and removed the separate class.

The code patching the javadocs output is now in AbstractJavadocMojo, the patch 
data in a resource file (encoded as US-ASCII). This is now easy to understand.

Currently there is no Mojo @Parameter to disable the patching, maybe we should 
add it.

I will report back once I tested with non-Oracle JDK if the patch is really 
safe for all types of Javadocs (JRockit, IBM J9). If not we should add some 
detection for Orcale/Sun/OpenJDK's JDKs and only patch Javadocs generated by 
their doclet (or only patch the default doclet?).

  was (Author: thetaphi):
I streamlined the patch a bit more and removed the separate class.

The code pathing the javadocs output is now in AbstractJavadocMojo, the patch 
data ina resource file (encoded as US-ASCII). This is now easy to understand.

Currently there is no Mojo @Parameter to disable the patching, maybe we should 
add it.

I will report back once I tested with non-Oracle JDK if the patch is really 
safe for all types of Javadocs (JRockit, IBM J9). If not we should add some 
detection for Orcale/Sun/OpenJDK's JDKs and only patch Javadocs generated by 
their doclet (or only patch the default doclet?).
  
> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
> Attachments: MJAVADOC-370.patch, MJAVADOC-370.patch, 
> MJAVADOC-370.patch, MJAVADOC-370.patch
>
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-24 Thread Uwe Schindler (ASF) (JIRA)

[ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=327220#comment-327220
 ] 

Uwe Schindler (ASF) commented on MJAVADOC-370:
--

Hi,
I just wanted to confirm that the auto-patching also works with IBM J9 6, IBM 
J9 7, and jRockit 6 (tested on Lucene's ANT task but the algorithm here is the 
same). Those JDKs produce identical javascript and are vulnerable like Oracle's 
original.
Uwe

> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
> Fix For: 2.9.1
>
> Attachments: MJAVADOC-370.patch, MJAVADOC-370.patch, 
> MJAVADOC-370.patch, MJAVADOC-370.patch
>
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-24 Thread Uwe Schindler (ASF) (JIRA)

[ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=327226#comment-327226
 ] 

Uwe Schindler (ASF) commented on MJAVADOC-370:
--

FYI, for ANT users I filed a similar issue: 
https://issues.apache.org/bugzilla/show_bug.cgi?id=55132

> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
> Fix For: 2.9.1
>
> Attachments: MJAVADOC-370.patch
>
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] (MJAVADOC-370) Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2])

2013-06-30 Thread Uwe Schindler (ASF) (JIRA)

[ 
https://jira.codehaus.org/browse/MJAVADOC-370?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=327696#comment-327696
 ] 

Uwe Schindler (ASF) commented on MJAVADOC-370:
--

Shouldn't the Apache Root POM not be updated ASAP to prevent any more security 
leaks? http://repo1.maven.org/maven2/org/apache/apache/13/apache-13.pom


> Javadoc vulnerability (CVE-2013-1571 [1], VU#225657 [2]) 
> -
>
> Key: MJAVADOC-370
> URL: https://jira.codehaus.org/browse/MJAVADOC-370
> Project: Maven 2.x Javadoc Plugin
>  Issue Type: Improvement
>Reporter: SebbASF
>Assignee: Olivier Lamy
>Priority: Blocker
> Fix For: 2.9.1
>
> Attachments: MJAVADOC-370.patch
>
>
> As per the Maven dev list:
> I expect you have all see the news about the Javadoc javascript bug.
> It's going to take a long time for everyone to update their Java
> installations to Java 1.7 u25. Likewise for builds that need to use
> other Java versions, tweaking poms so Java 7 is used for Javadocs
> whilst still maintaining compatibility is a non-trivial task.
> Is there any interest in releasing a "quick-fix" version of the
> javadoc plugin that automatically runs the tool after Javadoc
> completes?
> The fix code is in Java, and can easily be directly called from the
> plugin (no need to start a new process).
> The license looks friendly so long as the code is only used for
> Javadoc fixups, and changes are allowed, which is just as well -
> There are a couple of bugs in the tool as currently released.
> It does not close all the resources; and failure to close the input
> file means it cannot delete the original input file on Windows; that
> needs to be fixed as it would not make sense to keep the old faulty
> file (even if it is now called index.html.orig).
> I can provide details of the fixes, but a decent IDE will probably
> warn about them anyway.
> It would be a great service to the Java community if this could be 
> fast-tracked.
> [1] 
> http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
> [2]http://www.kb.cert.org/vuls/id/225657

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira