/hg/release/icedtea-web-1.0: 4 new changesets

dbhole at icedtea.classpath.org dbhole at icedtea.classpath.org
Tue Nov 8 08:02:18 PST 2011


changeset a121fcd57325 in /hg/release/icedtea-web-1.0
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.0?cmd=changeset;node=a121fcd57325
author: Deepak Bhole <dbhole at redhat.com>
date: Fri Oct 28 14:29:21 2011 -0400

	RH742515, CVE-2011-3377: IcedTea-Web: second-level domain subdomains
	and suffix domain SOP bypass


changeset 4f92ef9e37c4 in /hg/release/icedtea-web-1.0
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.0?cmd=changeset;node=4f92ef9e37c4
author: Deepak Bhole <dbhole at redhat.com>
date: Fri Oct 28 17:03:37 2011 -0400

	Prepare to release 1.0.6


changeset 8d74eb79a664 in /hg/release/icedtea-web-1.0
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.0?cmd=changeset;node=8d74eb79a664
author: Deepak Bhole <dbhole at redhat.com>
date: Tue Nov 08 10:58:21 2011 -0500

	Added tag icedtea-web-1.0.6 for changeset 4f92ef9e37c4


changeset 8d2ac271064f in /hg/release/icedtea-web-1.0
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.0?cmd=changeset;node=8d2ac271064f
author: Deepak Bhole <dbhole at redhat.com>
date: Fri Oct 28 17:27:54 2011 -0400

	Prepare for 1.0.7


diffstat:

 .hgtags                                                    |   1 +
 ChangeLog                                                  |  18 +++
 NEWS                                                       |   6 +-
 configure.ac                                               |   2 +-
 netx/net/sourceforge/jnlp/runtime/JNLPSecurityManager.java |  70 +-------------
 5 files changed, 26 insertions(+), 71 deletions(-)

diffs (138 lines):

diff -r 574e571c53ae -r 8d2ac271064f .hgtags
--- a/.hgtags	Wed Sep 28 16:29:29 2011 -0400
+++ b/.hgtags	Fri Oct 28 17:27:54 2011 -0400
@@ -5,3 +5,4 @@
 1cff369667f834dba0d9f01722245c3004947647 icedtea-web-1.0.3
 99a3760950c668b7da194ac3705e13d4677b3ef7 icedtea-web-1.0.4
 ef67e5cb533c98c1cf9b71e6a8dd86bebe9bc482 icedtea-web-1.0.5
+4f92ef9e37c4f70498784637da362e044c887727 icedtea-web-1.0.6
diff -r 574e571c53ae -r 8d2ac271064f ChangeLog
--- a/ChangeLog	Wed Sep 28 16:29:29 2011 -0400
+++ b/ChangeLog	Fri Oct 28 17:27:54 2011 -0400
@@ -1,3 +1,21 @@
+2011-10-28  Deepak Bhole <dbhole at redhat.com>
+
+	* configure.ac: Prepare for 1.0.7
+	* NEWS: Same
+
+2011-10-28  Deepak Bhole <dbhole at redhat.com>
+
+	* configure.ac: Prepare to release 1.0.6
+	* NEWS: Same
+
+2011-10-28  Deepak Bhole <dbhole at redhat.com>
+
+	RH742515, CVE-2011-3377: IcedTea-Web: second-level domain subdomains and
+	suffix domain SOP bypass
+	* NEWS: Updated
+	* netx/net/sourceforge/jnlp/runtime/JNLPSecurityManager.java
+	(checkPermission): Remove special case for SocketPermission.
+
 2011-09-28  Deepak Bhole <dbhole at redhat.com>
 
 	* configure.ac: Prepare for 1.0.6
diff -r 574e571c53ae -r 8d2ac271064f NEWS
--- a/NEWS	Wed Sep 28 16:29:29 2011 -0400
+++ b/NEWS	Fri Oct 28 17:27:54 2011 -0400
@@ -8,7 +8,11 @@
 
 CVE-XXXX-YYYY: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=XXXX-YYYY
 
-New in release 1.0.6 (2011-XX-XX):
+New in release 1.0.7 (2011-XX-XX):
+
+New in release 1.0.6 (2011-11-08):
+* Security updates
+  - RH742515, CVE-2011-3377: IcedTea-Web: second-level domain subdomains and suffix domain SOP bypass
 
 New in release 1.0.5 (2011-09-28):
 * Plugin
diff -r 574e571c53ae -r 8d2ac271064f configure.ac
--- a/configure.ac	Wed Sep 28 16:29:29 2011 -0400
+++ b/configure.ac	Fri Oct 28 17:27:54 2011 -0400
@@ -1,4 +1,4 @@
-AC_INIT([icedtea-web],[1.0.6pre],[distro-pkg-dev at openjdk.java.net], [icedtea-web], [http://icedtea.classpath.org/wiki/IcedTea-Web])
+AC_INIT([icedtea-web],[1.0.7pre],[distro-pkg-dev at openjdk.java.net], [icedtea-web], [http://icedtea.classpath.org/wiki/IcedTea-Web])
 AM_INIT_AUTOMAKE([1.9 tar-pax foreign])
 AC_CONFIG_FILES([Makefile])
 
diff -r 574e571c53ae -r 8d2ac271064f netx/net/sourceforge/jnlp/runtime/JNLPSecurityManager.java
--- a/netx/net/sourceforge/jnlp/runtime/JNLPSecurityManager.java	Wed Sep 28 16:29:29 2011 -0400
+++ b/netx/net/sourceforge/jnlp/runtime/JNLPSecurityManager.java	Fri Oct 28 17:27:54 2011 -0400
@@ -257,75 +257,7 @@
             //                }
             //            }
 
-            try {
-                super.checkPermission(perm);
-            } catch (SecurityException se) {
-
-                //This section is a special case for dealing with SocketPermissions.
-                if (JNLPRuntime.isDebug())
-                    System.err.println("Requesting permission: " + perm.toString());
-
-                //Change this SocketPermission's action to connect and accept
-                //(and resolve). This is to avoid asking for connect permission
-                //on every address resolve.
-                Permission tmpPerm = null;
-                if (perm instanceof SocketPermission) {
-                    tmpPerm = new SocketPermission(perm.getName(),
-                                                        SecurityConstants.SOCKET_CONNECT_ACCEPT_ACTION);
-
-                    // before proceeding, check if we are trying to connect to same origin
-                    ApplicationInstance app = getApplication();
-                    JNLPFile file = app.getJNLPFile();
-
-                    String srcHost = file.getSourceLocation().getAuthority();
-                    String destHost = name;
-
-                    // host = abc.xyz.com or abc.xyz.com:<port>
-                    if (destHost.indexOf(':') >= 0)
-                        destHost = destHost.substring(0, destHost.indexOf(':'));
-
-                    // host = abc.xyz.com
-                    String[] hostComponents = destHost.split("\\.");
-
-                    int length = hostComponents.length;
-                    if (length >= 2) {
-
-                        // address is in xxx.xxx.xxx format
-                        destHost = hostComponents[length - 2] + "." + hostComponents[length - 1];
-
-                        // host = xyz.com i.e. origin
-                        boolean isDestHostName = false;
-
-                        // make sure that it is not an ip address
-                        try {
-                            Integer.parseInt(hostComponents[length - 1]);
-                        } catch (NumberFormatException e) {
-                            isDestHostName = true;
-                        }
-
-                        if (isDestHostName) {
-                            // okay, destination is hostname. Now figure out if it is a subset of origin
-                            if (srcHost.endsWith(destHost)) {
-                                addPermission(tmpPerm);
-                                return;
-                            }
-                        }
-                    }
-                } else {
-                    tmpPerm = perm;
-                }
-
-                if (tmpPerm != null) {
-                    //askPermission will only prompt the user on SocketPermission
-                    //meaning we're denying all other SecurityExceptions that may arise.
-                    if (askPermission(tmpPerm)) {
-                        addPermission(tmpPerm);
-                        //return quietly.
-                    } else {
-                        throw se;
-                    }
-                }
-            }
+            super.checkPermission(perm);
         } catch (SecurityException ex) {
             if (JNLPRuntime.isDebug()) {
                 System.out.println("Denying permission: " + perm);



More information about the distro-pkg-dev mailing list