/hg/release/icedtea7-forest-2.0/jdk: 10 new changesets
andrew at icedtea.classpath.org
andrew at icedtea.classpath.org
Tue Oct 18 16:07:01 PDT 2011
changeset 48f1bca75df4 in /hg/release/icedtea7-forest-2.0/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.0/jdk?cmd=changeset;node=48f1bca75df4
author: andrew
date: Fri Oct 14 00:49:20 2011 +0100
7000600, CVE-2011-3547: InputStream skip() information leak
changeset 6384285f36bb in /hg/release/icedtea7-forest-2.0/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.0/jdk?cmd=changeset;node=6384285f36bb
author: andrew
date: Fri Oct 14 00:50:05 2011 +0100
7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
changeset 770d063de148 in /hg/release/icedtea7-forest-2.0/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.0/jdk?cmd=changeset;node=770d063de148
author: andrew
date: Fri Oct 14 00:50:39 2011 +0100
7023640, CVE-2011-3551: Java2D TransformHelper integer overflow
changeset 63bbe6780dd3 in /hg/release/icedtea7-forest-2.0/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.0/jdk?cmd=changeset;node=63bbe6780dd3
author: andrew
date: Fri Oct 14 00:50:59 2011 +0100
7032417, CVE-2011-3552: excessive default UDP socket limit under
SecurityManager
changeset fc3acc1b4e55 in /hg/release/icedtea7-forest-2.0/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.0/jdk?cmd=changeset;node=fc3acc1b4e55
author: andrew
date: Fri Oct 14 00:54:56 2011 +0100
7046823, CVE-2011-3544: missing SecurityManager checks in scripting
engine
changeset 8ebc1115d725 in /hg/release/icedtea7-forest-2.0/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.0/jdk?cmd=changeset;node=8ebc1115d725
author: andrew
date: Fri Oct 14 00:57:01 2011 +0100
7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress
error checks
changeset e88518dcf07c in /hg/release/icedtea7-forest-2.0/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.0/jdk?cmd=changeset;node=e88518dcf07c
author: andrew
date: Fri Oct 14 01:07:20 2011 +0100
7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext attack
against SSL/TLS (BEAST)
changeset 489108f8ddd1 in /hg/release/icedtea7-forest-2.0/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.0/jdk?cmd=changeset;node=489108f8ddd1
author: andrew
date: Fri Oct 14 01:09:01 2011 +0100
7077466, CVE-2011-3556: RMI DGC server remote code execution
7083012, CVE-2011-3557: RMI registry privileged code execution
changeset 2d793ad2620f in /hg/release/icedtea7-forest-2.0/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.0/jdk?cmd=changeset;node=2d793ad2620f
author: andrew
date: Fri Oct 14 01:09:35 2011 +0100
7096936, CVE-2011-3560: missing checkSetFactory calls in
HttpsURLConnection
changeset 2054526dd141 in /hg/release/icedtea7-forest-2.0/jdk
details: http://icedtea.classpath.org/hg/release/icedtea7-forest-2.0/jdk?cmd=changeset;node=2054526dd141
author: andrew
date: Fri Oct 14 03:02:15 2011 +0100
7077466, CVE-2011-3556: RMI DGC server remote code execution
diffstat:
src/share/classes/com/sun/net/ssl/HttpsURLConnection.java | 8 +-
src/share/classes/com/sun/script/javascript/RhinoScriptEngine.java | 49 +++++
src/share/classes/com/sun/script/javascript/RhinoTopLevel.java | 12 +-
src/share/classes/java/awt/AWTKeyStroke.java | 52 ++++-
src/share/classes/java/io/InputStream.java | 18 +-
src/share/classes/javax/net/ssl/HttpsURLConnection.java | 6 +-
src/share/classes/sun/net/ResourceManager.java | 9 +-
src/share/classes/sun/rmi/registry/RegistryImpl.java | 83 +++++++++-
src/share/classes/sun/rmi/server/LoaderHandler.java | 4 +-
src/share/classes/sun/rmi/server/UnicastServerRef.java | 8 +-
src/share/classes/sun/security/ssl/AppOutputStream.java | 28 +++-
src/share/classes/sun/security/ssl/CipherBox.java | 19 ++-
src/share/classes/sun/security/ssl/CipherSuite.java | 13 +-
src/share/classes/sun/security/ssl/EngineOutputRecord.java | 47 +++++-
src/share/classes/sun/security/ssl/Record.java | 18 ++-
src/share/classes/sun/security/ssl/SSLEngineImpl.java | 34 ++++
src/share/classes/sun/security/ssl/SSLSocketImpl.java | 36 ++++
src/share/native/com/sun/java/util/jar/pack/unpack.cpp | 4 +
src/share/native/com/sun/java/util/jar/pack/utils.cpp | 4 +-
src/share/native/com/sun/java/util/jar/pack/utils.h | 4 +-
src/share/native/sun/java2d/loops/TransformHelper.c | 57 ++++--
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/main.java | 4 +-
test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/CheckStatus.java | 4 +-
test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargeBufs.java | 4 +-
test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargePacket.java | 4 +-
25 files changed, 454 insertions(+), 75 deletions(-)
diffs (truncated from 1144 to 500 lines):
diff -r d9fca71ba183 -r 2054526dd141 src/share/classes/com/sun/net/ssl/HttpsURLConnection.java
--- a/src/share/classes/com/sun/net/ssl/HttpsURLConnection.java Fri Sep 30 05:30:03 2011 +0100
+++ b/src/share/classes/com/sun/net/ssl/HttpsURLConnection.java Fri Oct 14 03:02:15 2011 +0100
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 2000, 2004, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2000, 2011, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -179,6 +179,12 @@
throw new IllegalArgumentException(
"no SSLSocketFactory specified");
}
+
+ SecurityManager sm = System.getSecurityManager();
+ if (sm != null) {
+ sm.checkSetFactory();
+ }
+
sslSocketFactory = sf;
}
diff -r d9fca71ba183 -r 2054526dd141 src/share/classes/com/sun/script/javascript/RhinoScriptEngine.java
--- a/src/share/classes/com/sun/script/javascript/RhinoScriptEngine.java Fri Sep 30 05:30:03 2011 +0100
+++ b/src/share/classes/com/sun/script/javascript/RhinoScriptEngine.java Fri Oct 14 03:02:15 2011 +0100
@@ -29,6 +29,7 @@
import sun.org.mozilla.javascript.internal.*;
import java.lang.reflect.Method;
import java.io.*;
+import java.security.*;
import java.util.*;
@@ -45,6 +46,8 @@
private static final boolean DEBUG = false;
+ private AccessControlContext accCtxt;
+
/* Scope where standard JavaScript objects and our
* extensions to it are stored. Note that these are not
* user defined engine level global variables. These are
@@ -65,6 +68,10 @@
private static final int optimizationLevel = getOptimizationLevel();
static {
ContextFactory.initGlobal(new ContextFactory() {
+ /**
+ * Create new Context instance to be associated with the current thread.
+ */
+ @Override
protected Context makeContext() {
Context cx = super.makeContext();
cx.setLanguageVersion(languageVersion);
@@ -73,6 +80,40 @@
cx.setWrapFactory(RhinoWrapFactory.getInstance());
return cx;
}
+
+ /**
+ * Execute top call to script or function. When the runtime is about to
+ * execute a script or function that will create the first stack frame
+ * with scriptable code, it calls this method to perform the real call.
+ * In this way execution of any script happens inside this function.
+ */
+ @Override
+ protected Object doTopCall(final Callable callable,
+ final Context cx, final Scriptable scope,
+ final Scriptable thisObj, final Object[] args) {
+ AccessControlContext accCtxt = null;
+ Scriptable global = ScriptableObject.getTopLevelScope(scope);
+ Scriptable globalProto = global.getPrototype();
+ if (globalProto instanceof RhinoTopLevel) {
+ accCtxt = ((RhinoTopLevel)globalProto).getAccessContext();
+ }
+
+ if (accCtxt != null) {
+ return AccessController.doPrivileged(new PrivilegedAction<Object>() {
+ public Object run() {
+ return superDoTopCall(callable, cx, scope, thisObj, args);
+ }
+ }, accCtxt);
+ } else {
+ return superDoTopCall(callable, cx, scope, thisObj, args);
+ }
+ }
+
+ private Object superDoTopCall(Callable callable,
+ Context cx, Scriptable scope,
+ Scriptable thisObj, Object[] args) {
+ return super.doTopCall(callable, cx, scope, thisObj, args);
+ }
});
}
@@ -104,6 +145,10 @@
*/
public RhinoScriptEngine() {
+ if (System.getSecurityManager() != null) {
+ accCtxt = AccessController.getContext();
+ }
+
Context cx = enterContext();
try {
topLevel = new RhinoTopLevel(cx, this);
@@ -360,6 +405,10 @@
factory = fac;
}
+ AccessControlContext getAccessContext() {
+ return accCtxt;
+ }
+
Object[] wrapArguments(Object[] args) {
if (args == null) {
return Context.emptyArgs;
diff -r d9fca71ba183 -r 2054526dd141 src/share/classes/com/sun/script/javascript/RhinoTopLevel.java
--- a/src/share/classes/com/sun/script/javascript/RhinoTopLevel.java Fri Sep 30 05:30:03 2011 +0100
+++ b/src/share/classes/com/sun/script/javascript/RhinoTopLevel.java Fri Oct 14 03:02:15 2011 +0100
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2005, 2011, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -26,6 +26,7 @@
package com.sun.script.javascript;
import sun.org.mozilla.javascript.internal.*;
+import java.security.AccessControlContext;
import javax.script.*;
/**
@@ -38,7 +39,10 @@
*/
public final class RhinoTopLevel extends ImporterTopLevel {
RhinoTopLevel(Context cx, RhinoScriptEngine engine) {
- super(cx);
+ // second boolean parameter to super constructor tells whether
+ // to seal standard JavaScript objects or not. If security manager
+ // is present, we seal the standard objects.
+ super(cx, System.getSecurityManager() != null);
this.engine = engine;
@@ -152,5 +156,9 @@
return engine;
}
+ AccessControlContext getAccessContext() {
+ return engine.getAccessContext();
+ }
+
private RhinoScriptEngine engine;
}
diff -r d9fca71ba183 -r 2054526dd141 src/share/classes/java/awt/AWTKeyStroke.java
--- a/src/share/classes/java/awt/AWTKeyStroke.java Fri Sep 30 05:30:03 2011 +0100
+++ b/src/share/classes/java/awt/AWTKeyStroke.java Fri Oct 14 03:02:15 2011 +0100
@@ -25,6 +25,7 @@
package java.awt;
import java.awt.event.KeyEvent;
+import sun.awt.AppContext;
import java.awt.event.InputEvent;
import java.util.Collections;
import java.util.HashMap;
@@ -66,9 +67,6 @@
public class AWTKeyStroke implements Serializable {
static final long serialVersionUID = -6430539691155161871L;
- private static Map cache;
- private static AWTKeyStroke cacheKey;
- private static Constructor ctor = getCtor(AWTKeyStroke.class);
private static Map modifierKeywords;
/**
* Associates VK_XXX (as a String) with code (as Integer). This is
@@ -77,6 +75,25 @@
*/
private static VKCollection vks;
+ //A key for the collection of AWTKeyStrokes within AppContext.
+ private static Object APP_CONTEXT_CACHE_KEY = new Object();
+ //A key withing the cache
+ private static AWTKeyStroke APP_CONTEXT_KEYSTROKE_KEY = new AWTKeyStroke();
+
+ /*
+ * Reads keystroke class from AppContext and if null, puts there the
+ * AWTKeyStroke class.
+ * Must be called under locked AWTKeyStroke.class
+ */
+ private static Class getAWTKeyStrokeClass() {
+ Class clazz = (Class)AppContext.getAppContext().get(AWTKeyStroke.class);
+ if (clazz == null) {
+ clazz = AWTKeyStroke.class;
+ AppContext.getAppContext().put(AWTKeyStroke.class, AWTKeyStroke.class);
+ }
+ return clazz;
+ }
+
private char keyChar = KeyEvent.CHAR_UNDEFINED;
private int keyCode = KeyEvent.VK_UNDEFINED;
private int modifiers;
@@ -164,9 +181,12 @@
if (subclass == null) {
throw new IllegalArgumentException("subclass cannot be null");
}
- if (AWTKeyStroke.ctor.getDeclaringClass().equals(subclass)) {
- // Already registered
- return;
+ synchronized (AWTKeyStroke.class) {
+ Class keyStrokeClass = (Class)AppContext.getAppContext().get(AWTKeyStroke.class);
+ if (keyStrokeClass != null && keyStrokeClass.equals(subclass)){
+ // Already registered
+ return;
+ }
}
if (!AWTKeyStroke.class.isAssignableFrom(subclass)) {
throw new ClassCastException("subclass is not derived from AWTKeyStroke");
@@ -197,9 +217,9 @@
}
synchronized (AWTKeyStroke.class) {
- AWTKeyStroke.ctor = ctor;
- cache = null;
- cacheKey = null;
+ AppContext.getAppContext().put(AWTKeyStroke.class, subclass);
+ AppContext.getAppContext().remove(APP_CONTEXT_CACHE_KEY);
+ AppContext.getAppContext().remove(APP_CONTEXT_KEYSTROKE_KEY);
}
}
@@ -229,13 +249,19 @@
private static synchronized AWTKeyStroke getCachedStroke
(char keyChar, int keyCode, int modifiers, boolean onKeyRelease)
{
+ Map cache = (Map)AppContext.getAppContext().get(APP_CONTEXT_CACHE_KEY);
+ AWTKeyStroke cacheKey = (AWTKeyStroke)AppContext.getAppContext().get(APP_CONTEXT_KEYSTROKE_KEY);
+
if (cache == null) {
cache = new HashMap();
+ AppContext.getAppContext().put(APP_CONTEXT_CACHE_KEY, cache);
}
if (cacheKey == null) {
try {
- cacheKey = (AWTKeyStroke)ctor.newInstance((Object[]) null);
+ Class clazz = getAWTKeyStrokeClass();
+ cacheKey = (AWTKeyStroke)getCtor(clazz).newInstance((Object[]) null);
+ AppContext.getAppContext().put(APP_CONTEXT_KEYSTROKE_KEY, cacheKey);
} catch (InstantiationException e) {
assert(false);
} catch (IllegalAccessException e) {
@@ -253,9 +279,8 @@
if (stroke == null) {
stroke = cacheKey;
cache.put(stroke, stroke);
- cacheKey = null;
+ AppContext.getAppContext().remove(APP_CONTEXT_KEYSTROKE_KEY);
}
-
return stroke;
}
@@ -778,7 +803,8 @@
protected Object readResolve() throws java.io.ObjectStreamException {
synchronized (AWTKeyStroke.class) {
Class newClass = getClass();
- if (!newClass.equals(ctor.getDeclaringClass())) {
+ Class awtKeyStrokeClass = getAWTKeyStrokeClass();
+ if (!newClass.equals(awtKeyStrokeClass)) {
registerSubclass(newClass);
}
return getCachedStroke(keyChar, keyCode, modifiers, onKeyRelease);
diff -r d9fca71ba183 -r 2054526dd141 src/share/classes/java/io/InputStream.java
--- a/src/share/classes/java/io/InputStream.java Fri Sep 30 05:30:03 2011 +0100
+++ b/src/share/classes/java/io/InputStream.java Fri Oct 14 03:02:15 2011 +0100
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 1994, 2006, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1994, 2011, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -44,10 +44,9 @@
*/
public abstract class InputStream implements Closeable {
- // SKIP_BUFFER_SIZE is used to determine the size of skipBuffer
- private static final int SKIP_BUFFER_SIZE = 2048;
- // skipBuffer is initialized in skip(long), if needed.
- private static byte[] skipBuffer;
+ // MAX_SKIP_BUFFER_SIZE is used to determine the maximum buffer skip to
+ // use when skipping.
+ private static final int MAX_SKIP_BUFFER_SIZE = 2048;
/**
* Reads the next byte of data from the input stream. The value byte is
@@ -212,18 +211,15 @@
long remaining = n;
int nr;
- if (skipBuffer == null)
- skipBuffer = new byte[SKIP_BUFFER_SIZE];
-
- byte[] localSkipBuffer = skipBuffer;
if (n <= 0) {
return 0;
}
+ int size = (int)Math.min(MAX_SKIP_BUFFER_SIZE, remaining);
+ byte[] skipBuffer = new byte[size];
while (remaining > 0) {
- nr = read(localSkipBuffer, 0,
- (int) Math.min(SKIP_BUFFER_SIZE, remaining));
+ nr = read(skipBuffer, 0, (int)Math.min(size, remaining));
if (nr < 0) {
break;
}
diff -r d9fca71ba183 -r 2054526dd141 src/share/classes/javax/net/ssl/HttpsURLConnection.java
--- a/src/share/classes/javax/net/ssl/HttpsURLConnection.java Fri Sep 30 05:30:03 2011 +0100
+++ b/src/share/classes/javax/net/ssl/HttpsURLConnection.java Fri Oct 14 03:02:15 2011 +0100
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1999, 2011, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -357,6 +357,10 @@
"no SSLSocketFactory specified");
}
+ SecurityManager sm = System.getSecurityManager();
+ if (sm != null) {
+ sm.checkSetFactory();
+ }
sslSocketFactory = sf;
}
diff -r d9fca71ba183 -r 2054526dd141 src/share/classes/sun/net/ResourceManager.java
--- a/src/share/classes/sun/net/ResourceManager.java Fri Sep 30 05:30:03 2011 +0100
+++ b/src/share/classes/sun/net/ResourceManager.java Fri Oct 14 03:02:15 2011 +0100
@@ -41,13 +41,14 @@
/* default maximum number of udp sockets per VM
* when a security manager is enabled.
- * The default is 1024 which is high enough to be useful
+ * The default is 25 which is high enough to be useful
* but low enough to be well below the maximum number
- * of port numbers actually available on all OSes for
- * such sockets (5000 on some versions of windows)
+ * of port numbers actually available on all OSes
+ * when multiplied by the maximum feasible number of VM processes
+ * that could practically be spawned.
*/
- private static final int DEFAULT_MAX_SOCKETS = 1024;
+ private static final int DEFAULT_MAX_SOCKETS = 25;
private static final int maxSockets;
private static final AtomicInteger numSockets;
diff -r d9fca71ba183 -r 2054526dd141 src/share/classes/sun/rmi/registry/RegistryImpl.java
--- a/src/share/classes/sun/rmi/registry/RegistryImpl.java Fri Sep 30 05:30:03 2011 +0100
+++ b/src/share/classes/sun/rmi/registry/RegistryImpl.java Fri Oct 14 03:02:15 2011 +0100
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 1996, 2008, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1996, 2011, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -38,13 +38,23 @@
import java.rmi.registry.Registry;
import java.rmi.server.RMIClientSocketFactory;
import java.rmi.server.RMIServerSocketFactory;
+import java.security.AccessControlContext;
+import java.security.AccessController;
+import java.security.CodeSource;
+import java.security.Policy;
import java.security.PrivilegedActionException;
+import java.security.PrivilegedExceptionAction;
+import java.security.PermissionCollection;
+import java.security.Permissions;
+import java.security.ProtectionDomain;
import java.text.MessageFormat;
+import sun.rmi.server.LoaderHandler;
import sun.rmi.server.UnicastServerRef;
import sun.rmi.server.UnicastServerRef2;
import sun.rmi.transport.LiveRef;
import sun.rmi.transport.ObjectTable;
import sun.rmi.transport.Target;
+import sun.security.action.GetPropertyAction;
/**
* A "registry" exists on every node that allows RMI connections to
@@ -325,6 +335,19 @@
URL[] urls = sun.misc.URLClassPath.pathToURLs(envcp);
ClassLoader cl = new URLClassLoader(urls);
+ String codebaseProperty = null;
+ String prop = java.security.AccessController.doPrivileged(
+ new GetPropertyAction("java.rmi.server.codebase"));
+ if (prop != null && prop.trim().length() > 0) {
+ codebaseProperty = prop;
+ }
+ URL[] codebaseURLs = null;
+ if (codebaseProperty != null) {
+ codebaseURLs = sun.misc.URLClassPath.pathToURLs(codebaseProperty);
+ } else {
+ codebaseURLs = new URL[0];
+ }
+
/*
* Fix bugid 4242317: Classes defined by this class loader should
* be annotated with the value of the "java.rmi.server.codebase"
@@ -334,11 +357,19 @@
Thread.currentThread().setContextClassLoader(cl);
- int regPort = Registry.REGISTRY_PORT;
- if (args.length >= 1) {
- regPort = Integer.parseInt(args[0]);
+ final int regPort = (args.length >= 1) ? Integer.parseInt(args[0])
+ : Registry.REGISTRY_PORT;
+ try {
+ registry = AccessController.doPrivileged(
+ new PrivilegedExceptionAction<RegistryImpl>() {
+ public RegistryImpl run() throws RemoteException {
+ return new RegistryImpl(regPort);
+ }
+ }, getAccessControlContext(codebaseURLs));
+ } catch (PrivilegedActionException ex) {
+ throw (RemoteException) ex.getException();
}
- registry = new RegistryImpl(regPort);
+
// prevent registry from exiting
while (true) {
try {
@@ -358,4 +389,46 @@
}
System.exit(1);
}
+
+ /**
+ * Generates an AccessControlContext from several URLs.
+ * The approach used here is taken from the similar method
+ * getAccessControlContext() in the sun.applet.AppletPanel class.
+ */
+ private static AccessControlContext getAccessControlContext(URL[] urls) {
+ // begin with permissions granted to all code in current policy
+ PermissionCollection perms = AccessController.doPrivileged(
+ new java.security.PrivilegedAction<PermissionCollection>() {
+ public PermissionCollection run() {
+ CodeSource codesource = new CodeSource(null,
+ (java.security.cert.Certificate[]) null);
+ Policy p = java.security.Policy.getPolicy();
+ if (p != null) {
+ return p.getPermissions(codesource);
+ } else {
+ return new Permissions();
+ }
+ }
+ });
+
+ /*
+ * Anyone can connect to the registry and the registry can connect
+ * to and possibly download stubs from anywhere. Downloaded stubs and
+ * related classes themselves are more tightly limited by RMI.
+ */
+ perms.add(new SocketPermission("*", "connect,accept"));
+
+ // add permissions required to load from codebase URL path
+ LoaderHandler.addPermissionsForURLs(urls, perms, false);
+
+ /*
+ * Create an AccessControlContext that consists of a single
+ * protection domain with only the permissions calculated above.
+ */
+ ProtectionDomain pd = new ProtectionDomain(
+ new CodeSource((urls.length > 0 ? urls[0] : null),
+ (java.security.cert.Certificate[]) null),
+ perms);
+ return new AccessControlContext(new ProtectionDomain[] { pd });
+ }
}
diff -r d9fca71ba183 -r 2054526dd141 src/share/classes/sun/rmi/server/LoaderHandler.java
--- a/src/share/classes/sun/rmi/server/LoaderHandler.java Fri Sep 30 05:30:03 2011 +0100
+++ b/src/share/classes/sun/rmi/server/LoaderHandler.java Fri Oct 14 03:02:15 2011 +0100
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 1996, 2008, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1996, 2011, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -1031,7 +1031,7 @@
More information about the distro-pkg-dev
mailing list