security/index.html (220 lines of code) (raw):

<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>Security alerts </title> <meta name="description" content="Apache TomEE"> <meta name="author" content="Apache TomEE"> <meta name="google-translate-customization" content="f36a520c08f4c9-0a04e86a9c075ce9-g265f3196f697cf8f-10"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta http-equiv="Cache-Control" content="no-store, no-cache, must-revalidate, max-age=0"> <!-- Le HTML5 shim, for IE6-8 support of HTML elements --> <!--[if lt IE 9]> <script src="http://html5shim.googlecode.com/svn/trunk/html5.js"></script> <![endif]--> <!-- Le styles --> <link href="./../resources/css/bootstrap.css" rel="stylesheet"> <link href="./../resources/css/prettify.css" rel="stylesheet"> <!--link href="./../resources/css/bootstrap-mods.css" rel="stylesheet"--> <link href="./../resources/css/main.css" rel="stylesheet"> <link href="./../resources/font-awesome-4.6.3/css/font-awesome.min.css" rel="stylesheet"> <script type="text/javascript"> var t = encodeURIComponent(document.title.replace(/^\s+|\s+$/g,"")); var u = encodeURIComponent(""+document.URL); function fbshare () { window.open( "http://www.facebook.com/sharer/sharer.php?u="+u, 'Share on Facebook', 'width=640,height=426'); }; function gpshare () { window.open( "https://plus.google.com/share?url="+u, 'Share on Google+', 'width=584,height=385'); }; function twshare () { window.open( "https://twitter.com/intent/tweet?url="+u+"&text="+t, 'Share on Twitter', 'width=800,height=526'); }; function pinshare () { window.open("//www.pinterest.com/pin/create/button/?url="+u+"&media=http%3A%2F%2Ftomee.apache.org%2Fresources%2Fimages%2Ffeather-logo.png&description="+t, 'Share on Pinterest', 'width=800,height=526'); }; </script> <!-- Le fav and touch icons --> <link rel="shortcut icon" href="./../favicon.ico"> <link rel="apple-touch-icon" href="./../resources/images/apple-touch-icon.png"> <link rel="apple-touch-icon" sizes="72x72" href="./../resources/images/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="114x114" href="./../resources/images/apple-touch-icon-114x114.png"> <script src="./../resources/js/prettify.js" type="text/javascript"></script> <script src="./../resources/js/jquery-latest.js"></script> <script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script> <script src="./../resources/js/common.js"></script> <script src="./../resources/js/prettyprint.js"></script> <!--script src="//assets.pinterest.com/js/pinit.js" type="text/javascript" async></script//--> <script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-2717626-1']); _gaq.push(['_setDomainName', 'apache.org']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })(); </script> </head> <body> <div class="topbar" data-dropdown="dropdown"> <div class="fill"> <div class="container"> <a class="brand" href="./../index.html">Apache TomEE</a> <ul class="nav"> <li class="dropdown"> <a class="dropdown-toggle" data-toggle="dropdown" href="#"> Apache <b class="caret"></b> </a> <ul class="dropdown-menu"> <!-- <li><a href="./../misc/whoweare.html">Who we are?</a></li> --> <!-- <li><a href="./../misc/heritage.html">Heritage</a></li> --> <li><a href="http://www.apache.org">Apache Home</a></li> <!-- <li><a href="./../misc/resources.html">Resources</a></li> --> <li><a href="./../misc/contact.html">Contact</a></li> <li><a href="./../misc/legal.html">Legal</a></li> <li><a href="http://www.apache.org/foundation/sponsorship.html">Sponsorship</a></li> <li><a href="http://www.apache.org/foundation/thanks.html">Thanks</a></li> <li class="divider"/> <li><a href="http://www.apache.org/security">Security</a></li> </ul> </li> <li><a href="./../index.html">Home</a></li> <li><a href="./../downloads.html">Downloads</a></li> <li><a href="./../documentation.html">Documentation</a></li> <li><a href="./../examples-trunk/index.html">Examples</a></li> <li><a href="./../support.html">Support</a></li> <li><a href="./../contribute.html">Contribute</a></li> <li><a href="./../security/index.html">Security</a></li> </ul> <!-- Google CSE Search Box Begins --> <FORM class="pull-right" id="searchbox_010475492895890475512:_t4iqjrgx90" action="http://www.google.com/cse"> <INPUT type="hidden" name="cx" value="010475492895890475512:_t4iqjrgx90"> <INPUT type="hidden" name="cof" value="FORID:0"> <INPUT size="18" width="130" style="width:130px" name="q" type="text" placeholder="Search"> </FORM> <!--<SCRIPT type="text/javascript" src="http://www.google.com/coop/cse/brand?form=searchbox_010475492895890475512:_t4iqjrgx90"></SCRIPT>--> <!-- Google CSE Search Box Ends --> </div> </div> </div> <div class="container"> <div class="page-header"> <small><a href="./../index.html">Home</a>&nbsp;&raquo&nbsp;<a href="./../security/">Security</a></small><br> <h1>Security alerts <div style="float: right; position: relative; bottom: -10px; "> <a onclick="javascript:gpshare()" class="gp-share sprite" title="Share on Google+">share [gp]</a> <a onclick="javascript:fbshare()" class="fb-share sprite" title="Share on Facebook">share [fb]</a> <a onclick="javascript:twshare()" class="tw-share sprite" title="Share on Twitter">share [tw]</a> <a onclick="javascript:pinshare()" class="pin-share sprite" title="Share on Pinterest">share [pin]</a> <a data-toggle="modal" href="#edit" class="edit-page" title="Contribute to this Page">contribute</a> </div> </h1> </div> <h2>Security updates</h2> <h3>Apache TomEE</h3> <p>Please note that, except in rare circumstances, binary patches are not produced for individual vulnerabilities. To obtain the binary fix for a particular vulnerability you should upgrade to an Apache TomEE version where that vulnerability has been fixed.</p> <p>Source patches, usually in the form of references to SVN commits, may be provided in either in a vulnerability announcement and/or the vulnerability details listed on these pages. These source patches may be used by users wishing to build their own local version of TomEE with just that security patch rather than upgrade.</p> <p>Lists of security problems fixed in released versions of Apache TomEE are available:</p> <ul> <li><a href="tomee.html">Apache TomEE 1.5 Security Vulnerabilities</a></li> <li><a href="tomee.html">Apache TomEE 1.6 Security Vulnerabilities</a></li> <li><a href="tomee.html">Apache TomEE 1.7 Security Vulnerabilities</a></li> </ul> <h2>Reporting New Security Problems with Apache TomEE</h2> <p>The Apache Software Foundation takes a very active stance in eliminating security problems and denial of service attacks against Apache projects.</p> <p>We strongly encourage folks to report such problems to the <a href="http://www.apache.org/security">private security mailing list first</a>, before disclosing them in a public forum.</p> <p>Please note that the security mailing list should only be used for reporting undisclosed security vulnerabilities in Apache projects and managing the process of fixing such vulnerabilities. We cannot accept regular bug reports or other queries at this address. All mail sent to this address that does not relate to an undisclosed security problem will be ignored.</p> <p>If you need to report a bug that isn't an undisclosed security vulnerability, please use the <a href="https://issues.apache.org/jira/browse/TOMEE">bug reporting system</a>.</p> <p>Questions about:</p> <ul> <li>how to configure TomEE securely</li> <li>if a vulnerability applies to your particular application</li> <li>obtaining further information on a published vulnerability</li> <li>availability of patches and/or new releases</li> </ul> <p>should be addressed to the <a href="support.html">users mailing list</a>.</p> <p>The private security mailing address is: security (at) apache (dot) org</p> <p>Note that all networked servers are subject to denial of service attacks, and we cannot promise magic workarounds to generic problems (such as a client streaming lots of data to your server, or re-requesting the same URL repeatedly). In general our philosophy is to avoid any attacks which can cause the server to consume resources in a non-linear relationship to the size of inputs.</p> <h2>Third-party projects</h2> <p>Apache is built with the following components. Please see the security advisories information for each component for more information on the security vulnerabilities and issues that may affect that component.</p> <ul> <li>Apache Tomcat 7.x: <a href="http://tomcat.apache.org/security-7.html">Tomcat 7 security advisories</a></li> <li>Apache OpenJPA</li> <li>Apache CXF: <a href="http://cxf.apache.org/security-advisories.html">CXF Security Advisories</a></li> <li>Apache OpenWebBeans</li> <li>Apache MyFaces</li> <li>Apache Bean Validation</li> </ul> <p>By default any regular TomEE releases uses latest sub project releases, so that we can follow all security fixes as much as possible.</p> <h2>Apache TomEE versioning details</h2> <p>As security is a key concern in many companies, TomEE team also considers to deliver specific security fixes for those external projects being fixed. For instance, if Tomcat fixes a security issue in Tomcat x.y.z, used in TomEE a.b.c, we will consider packaging a new security update release using the new Tomcat release.</p> <p>In order to achieve a smoothly migration patch between a TomEE version and a security update, the TomEE team has decided to adopt the following versioning <em>major</em>.<em>minor</em>.<em>patch</em>[.<em>security update</em>]</p> <ul> <li>major ([0-9]+): it refers mainly to the Java EE version we implement. 1.x for Java EE 6 for example.</li> <li>minor ([0-9]+): contains features, bugfixes and security fixes (internal or third-party)</li> <li>patch ([0-9]+): only bugfixes applied</li> <li>security update (SEC[0-9]+)?: security update suffix that makes it possible to easily differentiate security fixes and to upgrade with a minimal of changes, hence impacts.</li> </ul> <p>The last security update part is optional, and applies when a sub project has been released and was under an advisory. The TomEE team will just grab the related tag and update the dependency. The release checks are then smaller and the community can deliver a fixed version faster.</p> <h2>Additional information</h2> <h3>Secunia</h3> <p>Secunia is an international IT security company specialising in vulnerability management based in Copenhagen, Denmark.</p> <p>There is an <a href="http://secunia.com/advisories/vendor/8/">Apache Software Foundation vendor</a> declared so you can follow all vulnerabilities related to Apache products. Of course, a Apache TomEE product is also available so you can search for know advisories.</p> <h3>Links</h3> <ul> <li><a href="http://apache.org/security/">http://apache.org/security/</a></li> <li><a href="http://apache.org/security/projects.html">http://apache.org/security/projects.html</a></li> <li><a href="http://apache.org/security/committers.html">http://apache.org/security/committers.html</a></li> <li><a href="http://cve.mitre.org/">Common Vulnerabilities and Exposures database</a></li> </ul> <div id="edit" class="modal hide fade in" style="display: none; "> <div class="modal-header"> <a class="close" data-dismiss="modal">x</a> <h3>Thank you for contributing to the documentation!</h3> </div> <div class="modal-body"> <h4>Any help with the documentation is greatly appreciated.</h4> <p>All edits are reviewed before going live, so feel free to do much more than fix typos or links. If you see a page that could benefit from an entire rewrite, we'd be thrilled to review it. Don't be surprised if we like it so much we ask you for help with other pages :)</p> <small>NOTICE: unless indicated otherwise on the pages in question, all editable content available from apache.org is presumed to be licensed under the Apache License (AL) version 2.0 and hence all submissions to apache.org treated as formal Contributions under the license terms.</small> <!--[if gt IE 6]> <h4>Internet Explorer Users</h4> <p>If you are not an Apache committer, click the Yes link and enter a <i>anonymous</i> for the username and leave the password empty</p> <![endif]--> </div> <div class="modal-footer"> Do you have an Apache ID? <a href="javascript:void(location.href='https://cms.apache.org/redirect?uri='+escape(location.href))" class="btn">Yes</a> <a href="javascript:void(location.href='https://anonymous:@cms.apache.org/redirect?uri='+escape(location.href))" class="btn">No</a> </div> </div> <script src="./../resources/js/bootstrap-modal.js"></script> <footer> <p>Copyright &copy; 1999-2016 The Apache Software Foundation, Licensed under the Apache License, Version 2.0. Apache TomEE, TomEE, Apache, the Apache feather logo, and the Apache TomEE project logo are trademarks of The Apache Software Foundation. All other marks mentioned may be trademarks or registered trademarks of their respective owners.</p> </footer> </div> <!-- /container --> <!-- Javascript ================================================== --> <!-- Placed at the end of the document so the pages load faster --> <script src="./../resources/js/bootstrap-dropdown.js"></script> </body> </html>