Potential Vulnerability in Cloned Code#109
Conversation
…sses/sun/awt/X11GraphicsDevice.java)
|
Hi @pr-hung, welcome to this OpenJDK project and thanks for contributing! We do not recognize you as Contributor and need to ensure you have signed the Oracle Contributor Agreement (OCA). If you have not signed the OCA, please follow the instructions. Please fill in your GitHub username in the "Username" field of the application. Once you have signed the OCA, please let us know by writing If you already are an OpenJDK Author, Committer or Reviewer, please click here to open a new issue so that we can record that fact. Please use "Add GitHub user pr-hung" as summary for the issue. If you are contributing this work on behalf of your employer and your employer has signed the OCA, please let us know by writing |
|
❗ This change is not yet ready to be integrated. |
|
If you believe there is a vulnerability, it should be reported through the proper channels: https://openjdk.org/groups/vulnerability/report |
Summary
This PR fixes a potential security vulnerability in cloned code that appears to have missed an upstream security patch.
Details
src/java.desktop/unix/classes/sun/awt/X11GraphicsDevice.javaWhat this PR does
References
Please review and merge this PR to ensure your repository is protected against this potential vulnerability.
Thank you for your time !
Progress
Error
Reviewing
Using
gitCheckout this PR locally:
$ git fetch https://git.openjdk.org/jdk11u.git pull/109/head:pull/109$ git checkout pull/109Update a local copy of the PR:
$ git checkout pull/109$ git pull https://git.openjdk.org/jdk11u.git pull/109/headUsing Skara CLI tools
Checkout this PR locally:
$ git pr checkout 109View PR using the GUI difftool:
$ git pr show -t 109Using diff file
Download this PR as a diff file:
https://git.openjdk.org/jdk11u/pull/109.diff