/hg/release/icedtea6-1.12: 4 new changesets
omajid at icedtea.classpath.org
omajid at icedtea.classpath.org
Tue Feb 19 13:20:21 PST 2013
changeset 0d3885207c19 in /hg/release/icedtea6-1.12
details: http://icedtea.classpath.org/hg/release/icedtea6-1.12?cmd=changeset;node=0d3885207c19
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Fri Feb 15 05:51:04 2013 +0000
Add latest security fixes.
2013-02-15 Andrew John Hughes <gnu.andrew at redhat.com>
* Makefile.am:
(SECURITY_PATCHES): Add latest security patches.
* NEWS: List security fixes & set release date.
* patches/security/20130219/8006446.patch,
* patches/security/20130219/8006777.patch,
* patches/security/20130219/8007688.patch:
New patches for next security update.
changeset abc58747fd2d in /hg/release/icedtea6-1.12
details: http://icedtea.classpath.org/hg/release/icedtea6-1.12?cmd=changeset;node=abc58747fd2d
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Fri Feb 15 05:51:33 2013 +0000
Prepare for 1.12.3.
2013-02-15 Andrew John Hughes <gnu.andrew at redhat.com>
* configure.ac: Set version to 1.12.3.
changeset 37209dd4b075 in /hg/release/icedtea6-1.12
details: http://icedtea.classpath.org/hg/release/icedtea6-1.12?cmd=changeset;node=37209dd4b075
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Sun Feb 17 20:29:04 2013 +0000
Add LogManager regressions.
2013-02-17 Andrew John Hughes <gnu.andrew at redhat.com>
* Makefile.am:
(ICEDTEA_PATCHES): Add new patches.
* NEWS: List new patches.
* patches/openjdk/8007393.patch,
* patches/openjdk/8007611.patch:
Regression fixes for LogManager.
changeset d556c798c5f5 in /hg/release/icedtea6-1.12
details: http://icedtea.classpath.org/hg/release/icedtea6-1.12?cmd=changeset;node=d556c798c5f5
author: Omair Majid <omajid at redhat.com>
date: Tue Feb 19 16:15:47 2013 -0500
Added tag icedtea6-1.12.3 for changeset 37209dd4b075
diffstat:
.hgtags | 1 +
ChangeLog | 23 +
Makefile.am | 9 +-
NEWS | 9 +-
configure.ac | 2 +-
patches/openjdk/8007393.patch | 78 ++
patches/openjdk/8007611.patch | 24 +
patches/security/20130219/8006446.patch | 395 +++++++++++
patches/security/20130219/8006777.patch | 1036 +++++++++++++++++++++++++++++++
patches/security/20130219/8007688.patch | 130 +++
10 files changed, 1703 insertions(+), 4 deletions(-)
diffs (truncated from 1776 to 500 lines):
diff -r bdd72e5a3d6b -r d556c798c5f5 .hgtags
--- a/.hgtags Fri Feb 15 03:27:10 2013 +0000
+++ b/.hgtags Tue Feb 19 16:15:47 2013 -0500
@@ -25,3 +25,4 @@
69b6ee29712304225f57535e507e6745e478ae9e icedtea6-1.12
63fea6a4bee0e2e8ecb9f2061dba92be4924ddb4 icedtea6-1.12.1
ba91bee6c0d6d4634a4d6de69095af01689f7419 icedtea6-1.12.2
+37209dd4b07599b5f83b33c63daae8d37c708e39 icedtea6-1.12.3
diff -r bdd72e5a3d6b -r d556c798c5f5 ChangeLog
--- a/ChangeLog Fri Feb 15 03:27:10 2013 +0000
+++ b/ChangeLog Tue Feb 19 16:15:47 2013 -0500
@@ -1,3 +1,26 @@
+2013-02-17 Andrew John Hughes <gnu.andrew at redhat.com>
+
+ * Makefile.am:
+ (ICEDTEA_PATCHES): Add new patches.
+ * NEWS: List new patches.
+ * patches/openjdk/8007393.patch,
+ * patches/openjdk/8007611.patch:
+ Regression fixes for LogManager.
+
+2013-02-15 Andrew John Hughes <gnu.andrew at redhat.com>
+
+ * configure.ac: Set version to 1.12.3.
+
+2013-02-15 Andrew John Hughes <gnu.andrew at redhat.com>
+
+ * Makefile.am:
+ (SECURITY_PATCHES): Add latest security patches.
+ * NEWS: List security fixes & set release date.
+ * patches/security/20130219/8006446.patch,
+ * patches/security/20130219/8006777.patch,
+ * patches/security/20130219/8007688.patch:
+ New patches for next security update.
+
2013-02-14 Andrew John Hughes <gnu.andrew at redhat.com>
PR1319: Support GIF lib v5.
diff -r bdd72e5a3d6b -r d556c798c5f5 Makefile.am
--- a/Makefile.am Fri Feb 15 03:27:10 2013 +0000
+++ b/Makefile.am Tue Feb 19 16:15:47 2013 -0500
@@ -274,7 +274,10 @@
patches/security/20130201/8001307.patch \
patches/security/20130201/8001972.patch \
patches/security/20130201/8002325.patch \
- patches/security/20130201/8001235.patch
+ patches/security/20130201/8001235.patch \
+ patches/security/20130219/8006446.patch \
+ patches/security/20130219/8006777.patch \
+ patches/security/20130219/8007688.patch
SPECIAL_SECURITY_PATCH = patches/security/20120214/7112642.patch
@@ -504,7 +507,9 @@
patches/openjdk/8005615-failure_to_load_logger_implementation.patch \
patches/openjdk/8004341-jck_dialog_failure.patch \
patches/openjdk/8004341-jck_dialog_failure-02.patch \
- patches/pr1319-support_giflib_5.patch
+ patches/pr1319-support_giflib_5.patch \
+ patches/openjdk/8007393.patch \
+ patches/openjdk/8007611.patch
if WITH_RHINO
ICEDTEA_PATCHES += \
diff -r bdd72e5a3d6b -r d556c798c5f5 NEWS
--- a/NEWS Fri Feb 15 03:27:10 2013 +0000
+++ b/NEWS Tue Feb 19 16:15:47 2013 -0500
@@ -10,8 +10,15 @@
CVE-XXXX-YYYY: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=XXXX-YYYY
-New in release 1.12.3 (2013-02-XX):
+New in release 1.12.3 (2013-02-19):
+* Security fixes
+ - S8006446: Restrict MBeanServer access
+ - S8006777: Improve TLS handling of invalid messages
+ - S8007688: Blacklist known bad certificate
+* Backports
+ - S8007393: Possible race condition after JDK-6664509
+ - S8007611: logging behavior in applet changed
* Bug fixes
- PR1319: Support GIF lib v5.
diff -r bdd72e5a3d6b -r d556c798c5f5 configure.ac
--- a/configure.ac Fri Feb 15 03:27:10 2013 +0000
+++ b/configure.ac Tue Feb 19 16:15:47 2013 -0500
@@ -1,4 +1,4 @@
-AC_INIT([icedtea6],[1.12.3pre],[distro-pkg-dev at openjdk.java.net])
+AC_INIT([icedtea6],[1.12.3],[distro-pkg-dev at openjdk.java.net])
AM_INIT_AUTOMAKE([1.9 tar-pax foreign])
AC_CONFIG_FILES([Makefile])
diff -r bdd72e5a3d6b -r d556c798c5f5 patches/openjdk/8007393.patch
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/patches/openjdk/8007393.patch Tue Feb 19 16:15:47 2013 -0500
@@ -0,0 +1,78 @@
+
+# HG changeset patch
+# User coffeys
+# Date 1360860659 0
+# Node ID 828b93329939ec20530ed98f42b2966b2ea53048
+# Parent cff0241d217f7b463d58ddcd0add8d41de9eb280
+8007393: Possible race condition after JDK-6664509
+Reviewed-by: mchung
+
+--- openjdk/jdk/src/share/classes/java/util/logging/LogManager.java Tue Feb 05 23:33:50 2013 +0000
++++ openjdk/jdk/src/share/classes/java/util/logging/LogManager.java Thu Feb 14 16:50:59 2013 +0000
+@@ -411,7 +411,40 @@ public class LogManager {
+ }
+
+ Logger demandSystemLogger(String name, String resourceBundleName) {
+- return systemContext.demandLogger(name, resourceBundleName);
++ // Add a system logger in the system context's namespace
++ final Logger sysLogger = systemContext.demandLogger(name, resourceBundleName);
++
++ // Add the system logger to the LogManager's namespace if not exist
++ // so that there is only one single logger of the given name.
++ // System loggers are visible to applications unless a logger of
++ // the same name has been added.
++ Logger logger;
++ do {
++ // First attempt to call addLogger instead of getLogger
++ // This would avoid potential bug in custom LogManager.getLogger
++ // implementation that adds a logger if not exists
++ if (addLogger(sysLogger)) {
++ // successfully added the new system logger
++ logger = sysLogger;
++ } else {
++ logger = getLogger(name);
++ }
++ } while (logger == null);
++
++ // LogManager will set the sysLogger's handlers via LogManager.addLogger method.
++ if (logger != sysLogger && sysLogger.getHandlers().length == 0) {
++ // if logger already exists but handlers not set
++ final Logger l = logger;
++ AccessController.doPrivileged(new PrivilegedAction<Void>() {
++ public Void run() {
++ for (Handler hdl : l.getHandlers()) {
++ sysLogger.addHandler(hdl);
++ }
++ return null;
++ }
++ });
++ }
++ return sysLogger;
+ }
+
+ // LoggerContext maintains the logger namespace per context.
+@@ -619,22 +652,7 @@ public class LogManager {
+ }
+ } while (result == null);
+ }
+- // Add the system logger to the LogManager's namespace if not exists
+- // The LogManager will set its handlers via the LogManager.addLogger method.
+- if (!manager.addLogger(result) && result.getHandlers().length == 0) {
+- // if logger already exists but handlers not set
+- final Logger l = manager.getLogger(name);
+- final Logger logger = result;
+- AccessController.doPrivileged(new PrivilegedAction<Void>() {
+- public Void run() {
+- for (Handler hdl : l.getHandlers()) {
+- logger.addHandler(hdl);
+- }
+- return null;
+- }
+- });
+- }
+- return result;
++ return result;
+ }
+ }
+
+
diff -r bdd72e5a3d6b -r d556c798c5f5 patches/openjdk/8007611.patch
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/patches/openjdk/8007611.patch Tue Feb 19 16:15:47 2013 -0500
@@ -0,0 +1,24 @@
+
+# HG changeset patch
+# User coffeys
+# Date 1360861865 0
+# Node ID 25e83b78298b71abb46eb5a337ed7bddef418ca4
+# Parent 828b93329939ec20530ed98f42b2966b2ea53048
+8007611: logging behavior in applet changed
+Reviewed-by: mchung
+
+--- openjdk/jdk/src/share/classes/java/util/logging/LogManager.java Thu Feb 14 16:50:59 2013 +0000
++++ openjdk/jdk/src/share/classes/java/util/logging/LogManager.java Thu Feb 14 17:11:05 2013 +0000
+@@ -351,7 +351,10 @@ public class LogManager {
+ context = userContext;
+ } else {
+ context = new LoggerContext();
+- context.addLocalLogger(manager.rootLogger);
++ // during initialization, rootLogger is null when
++ // instantiating itself RootLogger
++ if (manager.rootLogger != null)
++ context.addLocalLogger(manager.rootLogger);
+ }
+ javaAwtAccess.put(ecx, LoggerContext.class, context);
+ }
+
diff -r bdd72e5a3d6b -r d556c798c5f5 patches/security/20130219/8006446.patch
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/patches/security/20130219/8006446.patch Tue Feb 19 16:15:47 2013 -0500
@@ -0,0 +1,395 @@
+diff -Nru openjdk.orig/jdk/src/share/classes/com/sun/jmx/mbeanserver/ClassLoaderRepositorySupport.java openjdk/jdk/src/share/classes/com/sun/jmx/mbeanserver/ClassLoaderRepositorySupport.java
+--- openjdk.orig/jdk/src/share/classes/com/sun/jmx/mbeanserver/ClassLoaderRepositorySupport.java 2011-11-14 22:11:44.000000000 +0000
++++ openjdk/jdk/src/share/classes/com/sun/jmx/mbeanserver/ClassLoaderRepositorySupport.java 2013-02-15 03:40:40.511587149 +0000
+@@ -36,6 +36,7 @@
+
+ import javax.management.ObjectName;
+ import javax.management.loading.PrivateClassLoader;
++import sun.reflect.misc.ReflectUtil;
+
+ /**
+ * This class keeps the list of Class Loaders registered in the MBean Server.
+@@ -192,6 +193,7 @@
+ final ClassLoader without,
+ final ClassLoader stop)
+ throws ClassNotFoundException {
++ ReflectUtil.checkPackageAccess(className);
+ final int size = list.length;
+ for(int i=0; i<size; i++) {
+ try {
+diff -Nru openjdk.orig/jdk/src/share/classes/com/sun/jmx/mbeanserver/JmxMBeanServer.java openjdk/jdk/src/share/classes/com/sun/jmx/mbeanserver/JmxMBeanServer.java
+--- openjdk.orig/jdk/src/share/classes/com/sun/jmx/mbeanserver/JmxMBeanServer.java 2011-11-14 22:11:44.000000000 +0000
++++ openjdk/jdk/src/share/classes/com/sun/jmx/mbeanserver/JmxMBeanServer.java 2013-02-15 03:40:40.511587149 +0000
+@@ -57,6 +57,7 @@
+ import javax.management.RuntimeOperationsException;
+ import javax.management.MBeanServer;
+ import javax.management.MBeanServerDelegate;
++import javax.management.MBeanServerPermission;
+ import javax.management.loading.ClassLoaderRepository;
+
+ import static com.sun.jmx.defaults.JmxProperties.MBEANSERVER_LOGGER;
+@@ -1413,6 +1414,8 @@
+ // Default is true.
+ final boolean fairLock = DEFAULT_FAIR_LOCK_POLICY;
+
++ checkNewMBeanServerPermission();
++
+ // This constructor happens to disregard the value of the interceptors
+ // flag - that is, it always uses the default value - false.
+ // This is admitedly a bug, but we chose not to fix it for now
+@@ -1499,4 +1502,11 @@
+ }
+ }
+
++ private static void checkNewMBeanServerPermission() {
++ SecurityManager sm = System.getSecurityManager();
++ if (sm != null) {
++ Permission perm = new MBeanServerPermission("newMBeanServer");
++ sm.checkPermission(perm);
++ }
++ }
+ }
+diff -Nru openjdk.orig/jdk/src/share/classes/com/sun/jmx/mbeanserver/MBeanInstantiator.java openjdk/jdk/src/share/classes/com/sun/jmx/mbeanserver/MBeanInstantiator.java
+--- openjdk.orig/jdk/src/share/classes/com/sun/jmx/mbeanserver/MBeanInstantiator.java 2011-11-14 22:11:44.000000000 +0000
++++ openjdk/jdk/src/share/classes/com/sun/jmx/mbeanserver/MBeanInstantiator.java 2013-02-15 03:40:40.511587149 +0000
+@@ -32,11 +32,13 @@
+ import java.io.ObjectInputStream;
+ import java.lang.reflect.Constructor;
+ import java.lang.reflect.InvocationTargetException;
++import java.security.Permission;
+ import java.util.Map;
+ import java.util.logging.Level;
+
+ import javax.management.InstanceNotFoundException;
+ import javax.management.MBeanException;
++import javax.management.MBeanPermission;
+ import javax.management.NotCompliantMBeanException;
+ import javax.management.ObjectName;
+ import javax.management.OperationsException;
+@@ -44,7 +46,7 @@
+ import javax.management.RuntimeErrorException;
+ import javax.management.RuntimeMBeanException;
+ import javax.management.RuntimeOperationsException;
+-
++import sun.reflect.misc.ConstructorUtil;
+ import sun.reflect.misc.ReflectUtil;
+
+ /**
+@@ -56,7 +58,6 @@
+ * @since 1.5
+ */
+ public class MBeanInstantiator {
+-
+ private final ModifiableClassLoaderRepository clr;
+ // private MetaData meta = null;
+
+@@ -88,6 +89,7 @@
+ "Exception occurred during object instantiation");
+ }
+
++ ReflectUtil.checkPackageAccess(className);
+ try {
+ if (clr == null) throw new ClassNotFoundException(className);
+ theClass = clr.loadClass(className);
+@@ -162,6 +164,7 @@
+ continue;
+ }
+
++ ReflectUtil.checkPackageAccess(signature[i]);
+ // Ok we do not have a primitive type ! We need to build
+ // the signature of the method
+ //
+@@ -205,6 +208,9 @@
+ */
+ public Object instantiate(Class theClass)
+ throws ReflectionException, MBeanException {
++
++ checkMBeanPermission(theClass, null, null, "instantiate");
++
+ Object moi = null;
+
+
+@@ -260,6 +266,9 @@
+ public Object instantiate(Class theClass, Object params[],
+ String signature[], ClassLoader loader)
+ throws ReflectionException, MBeanException {
++
++ checkMBeanPermission(theClass, null, null, "instantiate");
++
+ // Instantiate the new object
+
+ // ------------------------------
+@@ -408,6 +417,8 @@
+ throw new RuntimeOperationsException(new
+ IllegalArgumentException(), "Null className passed in parameter");
+ }
++
++ ReflectUtil.checkPackageAccess(className);
+ Class theClass = null;
+ if (loaderName == null) {
+ // Load the class using the agent class loader
+@@ -620,13 +631,13 @@
+ **/
+ static Class loadClass(String className, ClassLoader loader)
+ throws ReflectionException {
+-
+ Class theClass = null;
+ if (className == null) {
+ throw new RuntimeOperationsException(new
+ IllegalArgumentException("The class name cannot be null"),
+ "Exception occurred during object instantiation");
+ }
++ ReflectUtil.checkPackageAccess(className);
+ try {
+ if (loader == null)
+ loader = MBeanInstantiator.class.getClassLoader();
+@@ -677,6 +688,7 @@
+ // We need to load the class through the class
+ // loader of the target object.
+ //
++ ReflectUtil.checkPackageAccess(signature[i]);
+ tab[i] = Class.forName(signature[i], false, aLoader);
+ }
+ } catch (ClassNotFoundException e) {
+@@ -702,7 +714,7 @@
+
+ private Constructor<?> findConstructor(Class<?> c, Class<?>[] params) {
+ try {
+- return c.getConstructor(params);
++ return ConstructorUtil.getConstructor(c, params);
+ } catch (Exception e) {
+ return null;
+ }
+@@ -716,4 +728,18 @@
+ char.class, boolean.class})
+ primitiveClasses.put(c.getName(), c);
+ }
++
++ private static void checkMBeanPermission(Class<?> clazz,
++ String member,
++ ObjectName objectName,
++ String actions) {
++ SecurityManager sm = System.getSecurityManager();
++ if (clazz != null && sm != null) {
++ Permission perm = new MBeanPermission(clazz.getName(),
++ member,
++ objectName,
++ actions);
++ sm.checkPermission(perm);
++ }
++ }
+ }
+diff -Nru openjdk.orig/jdk/src/share/classes/com/sun/jmx/mbeanserver/MBeanSupport.java openjdk/jdk/src/share/classes/com/sun/jmx/mbeanserver/MBeanSupport.java
+--- openjdk.orig/jdk/src/share/classes/com/sun/jmx/mbeanserver/MBeanSupport.java 2011-11-14 22:11:44.000000000 +0000
++++ openjdk/jdk/src/share/classes/com/sun/jmx/mbeanserver/MBeanSupport.java 2013-02-15 03:40:40.511587149 +0000
+@@ -38,6 +38,7 @@
+ import javax.management.NotCompliantMBeanException;
+ import javax.management.ObjectName;
+ import javax.management.ReflectionException;
++import sun.reflect.misc.ReflectUtil;
+
+ /**
+ * Base class for MBeans. There is one instance of this class for
+@@ -131,6 +132,7 @@
+ " is not an instance of " + mbeanInterface.getName();
+ throw new NotCompliantMBeanException(msg);
+ }
++ ReflectUtil.checkPackageAccess(mbeanInterface);
+ this.resource = resource;
+ MBeanIntrospector<M> introspector = getMBeanIntrospector();
+ this.perInterface = introspector.getPerInterface(mbeanInterface);
+diff -Nru openjdk.orig/jdk/src/share/classes/sun/management/LockDataConverter.java openjdk/jdk/src/share/classes/sun/management/LockDataConverter.java
+--- openjdk.orig/jdk/src/share/classes/sun/management/LockDataConverter.java 2011-11-14 22:12:00.000000000 +0000
++++ openjdk/jdk/src/share/classes/sun/management/LockDataConverter.java 2013-02-15 03:40:40.511587149 +0000
+@@ -27,6 +27,8 @@
+
+ import java.lang.management.LockInfo;
+ import java.lang.management.ThreadInfo;
++import java.security.AccessController;
++import java.security.PrivilegedAction;
+ import javax.management.Attribute;
+ import javax.management.StandardMBean;
+ import javax.management.openmbean.CompositeData;
+@@ -40,13 +42,13 @@
+ private LockInfo lockInfo;
+ private LockInfo[] lockedSyncs;
+
+- LockDataConverter() {
++ private LockDataConverter() {
+ super(LockDataConverterMXBean.class, true);
+ this.lockInfo = null;
+ this.lockedSyncs = null;
+ }
+
+- LockDataConverter(ThreadInfo ti) {
++ private LockDataConverter(ThreadInfo ti) {
+ super(LockDataConverterMXBean.class, true);
+ this.lockInfo = ti.getLockInfo();
+ this.lockedSyncs = ti.getLockedSynchronizers();
+@@ -104,8 +106,24 @@
+ }
+
+ static CompositeData toLockInfoCompositeData(LockInfo l) {
+- LockDataConverter ldc = new LockDataConverter();
++ LockDataConverter ldc = newLockDataConverter();
+ ldc.setLockInfo(l);
+ return ldc.toLockInfoCompositeData();
+ }
++
++ static LockDataConverter newLockDataConverter() {
++ return AccessController.doPrivileged(new PrivilegedAction<LockDataConverter>() {
++ public LockDataConverter run() {
++ return new LockDataConverter();
++ }
++ });
++ }
++
++ static LockDataConverter newLockDataConverter(final ThreadInfo ti) {
++ LockDataConverter result = newLockDataConverter();
++ result.lockInfo = ti.getLockInfo();
++ result.lockedSyncs = ti.getLockedSynchronizers();
++ return result;
++ }
+ }
++
+diff -Nru openjdk.orig/jdk/src/share/classes/sun/management/ThreadInfoCompositeData.java openjdk/jdk/src/share/classes/sun/management/ThreadInfoCompositeData.java
+--- openjdk.orig/jdk/src/share/classes/sun/management/ThreadInfoCompositeData.java 2011-11-14 22:12:01.000000000 +0000
++++ openjdk/jdk/src/share/classes/sun/management/ThreadInfoCompositeData.java 2013-02-15 03:40:40.511587149 +0000
+@@ -85,7 +85,7 @@
+ }
+
+ // Convert MonitorInfo[] and LockInfo[] to CompositeData[]
+- LockDataConverter converter = new LockDataConverter(threadInfo);
++ LockDataConverter converter = LockDataConverter.newLockDataConverter(threadInfo);
+ CompositeData lockInfoData = converter.toLockInfoCompositeData();
+ CompositeData[] lockedSyncsData = converter.toLockedSynchronizersCompositeData();
+
+@@ -315,7 +315,7 @@
+
+ // 6.0 new attributes
+ public LockInfo lockInfo() {
+- LockDataConverter converter = new LockDataConverter();
++ LockDataConverter converter = LockDataConverter.newLockDataConverter();
+ CompositeData lockInfoData = (CompositeData) cdata.get(LOCK_INFO);
+ return converter.toLockInfo(lockInfoData);
+ }
+@@ -336,7 +336,7 @@
+ }
+
+ public LockInfo[] lockedSynchronizers() {
+- LockDataConverter converter = new LockDataConverter();
++ LockDataConverter converter = LockDataConverter.newLockDataConverter();
+ CompositeData[] lockedSyncsData =
+ (CompositeData[]) cdata.get(LOCKED_SYNCS);
+
+diff -Nru openjdk.orig/jdk/src/share/lib/security/java.security openjdk/jdk/src/share/lib/security/java.security
+--- openjdk.orig/jdk/src/share/lib/security/java.security 2013-02-15 03:39:56.922892783 +0000
++++ openjdk/jdk/src/share/lib/security/java.security 2013-02-15 03:40:40.511587149 +0000
+@@ -131,8 +131,7 @@
+ com.sun.xml.internal.,\
+ com.sun.imageio.,\
+ com.sun.istack.internal.,\
+- com.sun.jmx.defaults.,\
+- com.sun.jmx.remote.util.
More information about the distro-pkg-dev
mailing list