[ https://issues.apache.org/jira/browse/DERBY-6619?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Dag H. Wanvik updated DERBY-6619: --------------------------------- Attachment: derby-6619-2-refinement.diff Attaching [^derby-6619-2-refinement.diff] which implements your suggested improvements to the test, Knut. Both seem good to me. > After silently swallowing SecurityExceptions, Derby can leak class loaders > -------------------------------------------------------------------------- > > Key: DERBY-6619 > URL: https://issues.apache.org/jira/browse/DERBY-6619 > Project: Derby > Issue Type: Bug > Components: Services > Reporter: Rick Hillegas > Assignee: Dag H. Wanvik > Fix For: 10.11.1.2, 10.12.0.0 > > Attachments: derby-6619-2-refinement.diff, derby-6619-2.diff, > derby-6619-2b.diff, derby-6619.diff, derby-6619.status, derby-6619b.diff, > derby-6619c.diff, derby.log, system-loader.diff > > > As part of the fix for DERBY-3745, Derby silently swallows security > exceptions and leaks class loaders. This can give rise to denial-of-service > attacks. At a minimum, Derby should report the swallowed exceptions so that > the security policy can be corrected and the application can be hardened > against this attack. The swallowing occurs at these locations: > {noformat} > org.apache.derby.impl.services.timer.SingletonTimerFactory run Catch > java.lang.SecurityException 0 line 175 > org.apache.derby.impl.services.timer.SingletonTimerFactory run Catch > java.lang.SecurityException 1 line 158 > {noformat} -- This message was sent by Atlassian JIRA (v6.2#6252)