RFR: 8319332: Security properties files inclusion [v7]

Weijun Wang weijun at openjdk.org
Fri Apr 19 13:21:58 UTC 2024


On Fri, 19 Apr 2024 13:02:03 GMT, Francisco Ferrari Bihurriet <fferrari at openjdk.org> wrote:

> > > Is it worth breaking such invalid URLs?

I'm just not sure about the compatibility impact. The example "file:///C:\some\path\extra.properties" you gave looks quite innocent and could be generated by a casual script.

Can this be separated from this PR?

-------------

PR Comment: https://git.openjdk.org/jdk/pull/16483#issuecomment-2066571209



More information about the security-dev mailing list