RFR: 8319332: Security properties files inclusion [v7]
Weijun Wang
weijun at openjdk.org
Fri Apr 19 13:21:58 UTC 2024
On Fri, 19 Apr 2024 13:02:03 GMT, Francisco Ferrari Bihurriet <fferrari at openjdk.org> wrote:
> > > Is it worth breaking such invalid URLs?
I'm just not sure about the compatibility impact. The example "file:///C:\some\path\extra.properties" you gave looks quite innocent and could be generated by a casual script.
Can this be separated from this PR?
-------------
PR Comment: https://git.openjdk.org/jdk/pull/16483#issuecomment-2066571209
More information about the security-dev
mailing list