Return-Path: X-Original-To: apmail-db-derby-dev-archive@www.apache.org Delivered-To: apmail-db-derby-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id EEA3A1152D for ; Mon, 18 Aug 2014 22:13:21 +0000 (UTC) Received: (qmail 26342 invoked by uid 500); 18 Aug 2014 22:13:21 -0000 Delivered-To: apmail-db-derby-dev-archive@db.apache.org Received: (qmail 26318 invoked by uid 500); 18 Aug 2014 22:13:21 -0000 Mailing-List: contact derby-dev-help@db.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: Delivered-To: mailing list derby-dev@db.apache.org Received: (qmail 26305 invoked by uid 99); 18 Aug 2014 22:13:21 -0000 Received: from arcas.apache.org (HELO arcas.apache.org) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 18 Aug 2014 22:13:21 +0000 Date: Mon, 18 Aug 2014 22:13:21 +0000 (UTC) From: "Dag H. Wanvik (JIRA)" To: derby-dev@db.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Comment Edited] (DERBY-6619) After silently swallowing SecurityExceptions, Derby can leak class loaders MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 [ https://issues.apache.org/jira/browse/DERBY-6619?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14101393#comment-14101393 ] Dag H. Wanvik edited comment on DERBY-6619 at 8/18/14 10:13 PM: ---------------------------------------------------------------- Uploading a patch [^derby-6619.diff] which prints warnings on derby.log. For example, with this invocation: {code} java -jar jars/sane/derbyrun.jar server start {code} which uses the default security manager, the derby.log looks as in [^derby.log]. was (Author: dagw): Uploading a patch [derby-6619.diff] which prints warnings on derby.log. For example, with this invocation: {code} java -jar jars/sane/derbyrun.jar server start {code} which uses the default security manager, the derby.log looks as in [^derby.log]. > After silently swallowing SecurityExceptions, Derby can leak class loaders > -------------------------------------------------------------------------- > > Key: DERBY-6619 > URL: https://issues.apache.org/jira/browse/DERBY-6619 > Project: Derby > Issue Type: Bug > Components: Services > Reporter: Rick Hillegas > Assignee: Dag H. Wanvik > Attachments: derby-6619.diff, derby-6619.status > > > As part of the fix for DERBY-3745, Derby silently swallows security exceptions and leaks class loaders. This can give rise to denial-of-service attacks. At a minimum, Derby should report the swallowed exceptions so that the security policy can be corrected and the application can be hardened against this attack. The swallowing occurs at these locations: > {noformat} > org.apache.derby.impl.services.timer.SingletonTimerFactory run Catch java.lang.SecurityException 0 line 175 > org.apache.derby.impl.services.timer.SingletonTimerFactory run Catch java.lang.SecurityException 1 line 158 > {noformat} -- This message was sent by Atlassian JIRA (v6.2#6252)