Skip to content

Commit b68fa43

Browse files
author
Brent Christian
committed
Merge
Reviewed-by: kcr, prr
2 parents d55e1b4 + e1d1fa9 commit b68fa43

File tree

15 files changed

+216
-51
lines changed

15 files changed

+216
-51
lines changed

src/hotspot/share/classfile/stackMapTable.cpp

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,8 +132,16 @@ bool StackMapTable::match_stackmap(
132132
}
133133

134134
void StackMapTable::check_jump_target(
135-
StackMapFrame* frame, int32_t target, TRAPS) const {
135+
StackMapFrame* frame, int bci, int offset, TRAPS) const {
136136
ErrorContext ctx;
137+
// Jump targets must be within the method and the method size is limited. See JVMS 4.11
138+
int min_offset = -1 * max_method_code_size;
139+
if (offset < min_offset || offset > max_method_code_size) {
140+
frame->verifier()->verify_error(ErrorContext::bad_stackmap(bci, frame),
141+
"Illegal target of jump or branch (bci %d + offset %d)", bci, offset);
142+
return;
143+
}
144+
int target = bci + offset;
137145
bool match = match_stackmap(
138146
frame, target, true, false, &ctx, CHECK_VERIFY(frame->verifier()));
139147
if (!match || (target < 0 || target >= _code_length)) {

src/hotspot/share/classfile/stackMapTable.hpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ class StackMapTable : public StackObj {
6767

6868
// Check jump instructions. Make sure there are no uninitialized
6969
// instances on backward branch.
70-
void check_jump_target(StackMapFrame* frame, int32_t target, TRAPS) const;
70+
void check_jump_target(StackMapFrame* frame, int bci, int offset, TRAPS) const;
7171

7272
// The following methods are only used inside this class.
7373

src/hotspot/share/classfile/verifier.cpp

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -781,7 +781,6 @@ void ClassVerifier::verify_method(const methodHandle& m, TRAPS) {
781781

782782
// Merge with the next instruction
783783
{
784-
int target;
785784
VerificationType type, type2;
786785
VerificationType atype;
787786

@@ -1606,9 +1605,8 @@ void ClassVerifier::verify_method(const methodHandle& m, TRAPS) {
16061605
case Bytecodes::_ifle:
16071606
current_frame.pop_stack(
16081607
VerificationType::integer_type(), CHECK_VERIFY(this));
1609-
target = bcs.dest();
16101608
stackmap_table.check_jump_target(
1611-
&current_frame, target, CHECK_VERIFY(this));
1609+
&current_frame, bcs.bci(), bcs.get_offset_s2(), CHECK_VERIFY(this));
16121610
no_control_flow = false; break;
16131611
case Bytecodes::_if_acmpeq :
16141612
case Bytecodes::_if_acmpne :
@@ -1619,19 +1617,16 @@ void ClassVerifier::verify_method(const methodHandle& m, TRAPS) {
16191617
case Bytecodes::_ifnonnull :
16201618
current_frame.pop_stack(
16211619
VerificationType::reference_check(), CHECK_VERIFY(this));
1622-
target = bcs.dest();
16231620
stackmap_table.check_jump_target
1624-
(&current_frame, target, CHECK_VERIFY(this));
1621+
(&current_frame, bcs.bci(), bcs.get_offset_s2(), CHECK_VERIFY(this));
16251622
no_control_flow = false; break;
16261623
case Bytecodes::_goto :
1627-
target = bcs.dest();
16281624
stackmap_table.check_jump_target(
1629-
&current_frame, target, CHECK_VERIFY(this));
1625+
&current_frame, bcs.bci(), bcs.get_offset_s2(), CHECK_VERIFY(this));
16301626
no_control_flow = true; break;
16311627
case Bytecodes::_goto_w :
1632-
target = bcs.dest_w();
16331628
stackmap_table.check_jump_target(
1634-
&current_frame, target, CHECK_VERIFY(this));
1629+
&current_frame, bcs.bci(), bcs.get_offset_s4(), CHECK_VERIFY(this));
16351630
no_control_flow = true; break;
16361631
case Bytecodes::_tableswitch :
16371632
case Bytecodes::_lookupswitch :
@@ -2280,15 +2275,14 @@ void ClassVerifier::verify_switch(
22802275
}
22812276
}
22822277
}
2283-
int target = bci + default_offset;
2284-
stackmap_table->check_jump_target(current_frame, target, CHECK_VERIFY(this));
2278+
stackmap_table->check_jump_target(current_frame, bci, default_offset, CHECK_VERIFY(this));
22852279
for (int i = 0; i < keys; i++) {
22862280
// Because check_jump_target() may safepoint, the bytecode could have
22872281
// moved, which means 'aligned_bcp' is no good and needs to be recalculated.
22882282
aligned_bcp = align_up(bcs->bcp() + 1, jintSize);
2289-
target = bci + (jint)Bytes::get_Java_u4(aligned_bcp+(3+i*delta)*jintSize);
2283+
int offset = (jint)Bytes::get_Java_u4(aligned_bcp+(3+i*delta)*jintSize);
22902284
stackmap_table->check_jump_target(
2291-
current_frame, target, CHECK_VERIFY(this));
2285+
current_frame, bci, offset, CHECK_VERIFY(this));
22922286
}
22932287
NOT_PRODUCT(aligned_bcp = nullptr); // no longer valid at this point
22942288
}

src/hotspot/share/interpreter/bytecodeStream.hpp

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -100,8 +100,23 @@ class BaseBytecodeStream: StackObj {
100100
void set_next_bci(int bci) { assert(0 <= bci && bci <= method()->code_size(), "illegal bci"); _next_bci = bci; }
101101

102102
// Bytecode-specific attributes
103-
int dest() const { return bci() + bytecode().get_offset_s2(raw_code()); }
104-
int dest_w() const { return bci() + bytecode().get_offset_s4(raw_code()); }
103+
int get_offset_s2() const { return bytecode().get_offset_s2(raw_code()); }
104+
int get_offset_s4() const { return bytecode().get_offset_s4(raw_code()); }
105+
106+
// These methods are not safe to use before or during verification as they may
107+
// have large offsets and cause overflows
108+
int dest() const {
109+
int min_offset = -1 * max_method_code_size;
110+
int offset = bytecode().get_offset_s2(raw_code());
111+
guarantee(offset >= min_offset && offset <= max_method_code_size, "must be");
112+
return bci() + offset;
113+
}
114+
int dest_w() const {
115+
int min_offset = -1 * max_method_code_size;
116+
int offset = bytecode().get_offset_s4(raw_code());
117+
guarantee(offset >= min_offset && offset <= max_method_code_size, "must be");
118+
return bci() + offset;
119+
}
105120

106121
// One-byte indices.
107122
u1 get_index_u1() const { assert_raw_index_size(1); return *(jubyte*)(bcp()+1); }

src/java.base/share/classes/java/lang/AbstractStringBuilder.java

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1448,8 +1448,8 @@ public AbstractStringBuilder insert(int dstOffset, CharSequence s,
14481448
shift(currValue, coder, count, dstOffset, len);
14491449
count += len;
14501450
// Coder of CharSequence may be a mismatch, requiring the value array to be inflated
1451-
byte[] newValue = (s instanceof String str)
1452-
? putStringAt(currValue, coder, count, dstOffset, str, start, end)
1451+
byte[] newValue = (s instanceof String str && str.length() == len)
1452+
? putStringAt(currValue, coder, count, dstOffset, str)
14531453
: putCharsAt(currValue, coder, count, dstOffset, s, start, end);
14541454
if (currValue != newValue) {
14551455
this.coder = UTF16;
@@ -1928,10 +1928,10 @@ private static byte[] inflateIfNeededFor(byte[] value, int count, byte coder, by
19281928
* @param index the index to insert the string
19291929
* @param str the string
19301930
*/
1931-
private static byte[] putStringAt(byte[] value, byte coder, int count, int index, String str, int off, int end) {
1931+
private static byte[] putStringAt(byte[] value, byte coder, int count, int index, String str) {
19321932
byte[] newValue = inflateIfNeededFor(value, count, coder, str.coder());
19331933
coder = (newValue == value) ? coder : UTF16;
1934-
str.getBytes(newValue, off, index, coder, end - off);
1934+
str.getBytes(newValue, 0, index, coder, str.length());
19351935
return newValue;
19361936
}
19371937

src/java.base/share/classes/sun/security/util/DerValue.java

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -859,6 +859,22 @@ public String getUniversalString() throws IOException {
859859
return readStringInternal(tag_UniversalString, new UTF_32BE());
860860
}
861861

862+
/**
863+
* Checks that the BMPString does not contain any surrogate characters,
864+
* which are outside the Basic Multilingual Plane.
865+
*
866+
* @throws IOException if illegal characters are detected
867+
*/
868+
public void validateBMPString() throws IOException {
869+
String bmpString = getBMPString();
870+
for (int i = 0; i < bmpString.length(); i++) {
871+
if (Character.isSurrogate(bmpString.charAt(i))) {
872+
throw new IOException(
873+
"Illegal character in BMPString, index: " + i);
874+
}
875+
}
876+
}
877+
862878
/**
863879
* Reads the ASN.1 NULL value
864880
*/

src/java.base/share/classes/sun/security/x509/AVA.java

Lines changed: 45 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1996, 2024, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1996, 2025, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -28,10 +28,13 @@
2828
import java.io.ByteArrayOutputStream;
2929
import java.io.IOException;
3030
import java.io.Reader;
31+
import java.nio.charset.Charset;
3132
import java.text.Normalizer;
3233
import java.util.*;
3334

35+
import static java.nio.charset.StandardCharsets.ISO_8859_1;
3436
import static java.nio.charset.StandardCharsets.UTF_8;
37+
import static java.nio.charset.StandardCharsets.UTF_16BE;
3538

3639
import sun.security.util.*;
3740
import sun.security.pkcs.PKCS9Attribute;
@@ -589,6 +592,10 @@ private static boolean trailingSpace(Reader in) throws IOException {
589592
throw new IOException("AVA, extra bytes = "
590593
+ derval.data.available());
591594
}
595+
596+
if (value.tag == DerValue.tag_BMPString) {
597+
value.validateBMPString();
598+
}
592599
}
593600

594601
AVA(DerInputStream in) throws IOException {
@@ -713,7 +720,8 @@ public String toRFC2253String(Map<String, String> oidMap) {
713720
* NOTE: this implementation only emits DirectoryStrings of the
714721
* types returned by isDerString().
715722
*/
716-
String valStr = new String(value.getDataBytes(), UTF_8);
723+
String valStr =
724+
new String(value.getDataBytes(), getCharset(value, false));
717725

718726
/*
719727
* 2.4 (cont): If the UTF-8 string does not have any of the
@@ -832,7 +840,8 @@ public String toRFC2253CanonicalString() {
832840
* NOTE: this implementation only emits DirectoryStrings of the
833841
* types returned by isDerString().
834842
*/
835-
String valStr = new String(value.getDataBytes(), UTF_8);
843+
String valStr =
844+
new String(value.getDataBytes(), getCharset(value, true));
836845

837846
/*
838847
* 2.4 (cont): If the UTF-8 string does not have any of the
@@ -927,6 +936,39 @@ private static boolean isDerString(DerValue value, boolean canonical) {
927936
}
928937
}
929938

939+
/*
940+
* Returns the charset that should be used to decode each DN string type.
941+
*
942+
* This method ensures that multi-byte (UTF8String and BMPString) types
943+
* are decoded using the correct charset and the String forms represent
944+
* the correct characters. For 8-bit ASCII-based types (PrintableString
945+
* and IA5String), we return ISO_8859_1 rather than ASCII, so that the
946+
* complete range of characters can be represented, as many certificates
947+
* do not comply with the Internationalized Domain Name ACE format.
948+
*
949+
* NOTE: this method only supports DirectoryStrings of the types returned
950+
* by isDerString().
951+
*/
952+
private static Charset getCharset(DerValue value, boolean canonical) {
953+
if (canonical) {
954+
return switch (value.tag) {
955+
case DerValue.tag_PrintableString -> ISO_8859_1;
956+
case DerValue.tag_UTF8String -> UTF_8;
957+
default -> throw new Error("unexpected tag: " + value.tag);
958+
};
959+
}
960+
961+
return switch (value.tag) {
962+
case DerValue.tag_PrintableString,
963+
DerValue.tag_T61String,
964+
DerValue.tag_IA5String,
965+
DerValue.tag_GeneralString -> ISO_8859_1;
966+
case DerValue.tag_BMPString -> UTF_16BE;
967+
case DerValue.tag_UTF8String -> UTF_8;
968+
default -> throw new Error("unexpected tag: " + value.tag);
969+
};
970+
}
971+
930972
boolean hasRFC2253Keyword() {
931973
return AVAKeyword.hasKeyword(oid, RFC2253);
932974
}

src/java.base/share/native/libverify/check_code.c

Lines changed: 28 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -395,7 +395,8 @@ static jboolean is_superclass(context_type *, fullinfo_type);
395395

396396
static void initialize_exception_table(context_type *);
397397
static int instruction_length(unsigned char *iptr, unsigned char *end);
398-
static jboolean isLegalTarget(context_type *, int offset);
398+
static jboolean isLegalOffset(context_type *, int bci, int offset);
399+
static jboolean isLegalTarget(context_type *, int target);
399400
static void verify_constant_pool_type(context_type *, int, unsigned);
400401

401402
static void initialize_dataflow(context_type *);
@@ -1154,9 +1155,9 @@ verify_opcode_operands(context_type *context, unsigned int inumber, int offset)
11541155
case JVM_OPC_goto: {
11551156
/* Set the ->operand to be the instruction number of the target. */
11561157
int jump = (((signed char)(code[offset+1])) << 8) + code[offset+2];
1157-
int target = offset + jump;
1158-
if (!isLegalTarget(context, target))
1158+
if (!isLegalOffset(context, offset, jump))
11591159
CCerror(context, "Illegal target of jump or branch");
1160+
int target = offset + jump;
11601161
this_idata->operand.i = code_data[target];
11611162
break;
11621163
}
@@ -1170,9 +1171,9 @@ verify_opcode_operands(context_type *context, unsigned int inumber, int offset)
11701171
int jump = (((signed char)(code[offset+1])) << 24) +
11711172
(code[offset+2] << 16) + (code[offset+3] << 8) +
11721173
(code[offset + 4]);
1173-
int target = offset + jump;
1174-
if (!isLegalTarget(context, target))
1174+
if (!isLegalOffset(context, offset, jump))
11751175
CCerror(context, "Illegal target of jump or branch");
1176+
int target = offset + jump;
11761177
this_idata->operand.i = code_data[target];
11771178
break;
11781179
}
@@ -1211,13 +1212,16 @@ verify_opcode_operands(context_type *context, unsigned int inumber, int offset)
12111212
}
12121213
}
12131214
saved_operand = NEW(int, keys + 2);
1214-
if (!isLegalTarget(context, offset + _ck_ntohl(lpc[0])))
1215+
int jump = _ck_ntohl(lpc[0]);
1216+
if (!isLegalOffset(context, offset, jump))
12151217
CCerror(context, "Illegal default target in switch");
1216-
saved_operand[keys + 1] = code_data[offset + _ck_ntohl(lpc[0])];
1218+
int target = offset + jump;
1219+
saved_operand[keys + 1] = code_data[target];
12171220
for (k = keys, lptr = &lpc[3]; --k >= 0; lptr += delta) {
1218-
int target = offset + _ck_ntohl(lptr[0]);
1219-
if (!isLegalTarget(context, target))
1221+
jump = _ck_ntohl(lptr[0]);
1222+
if (!isLegalOffset(context, offset, jump))
12201223
CCerror(context, "Illegal branch in tableswitch");
1224+
target = offset + jump;
12211225
saved_operand[k + 1] = code_data[target];
12221226
}
12231227
saved_operand[0] = keys + 1; /* number of successors */
@@ -1746,11 +1750,24 @@ static int instruction_length(unsigned char *iptr, unsigned char *end)
17461750

17471751
/* Given the target of a branch, make sure that it's a legal target. */
17481752
static jboolean
1749-
isLegalTarget(context_type *context, int offset)
1753+
isLegalTarget(context_type *context, int target)
1754+
{
1755+
int code_length = context->code_length;
1756+
int *code_data = context->code_data;
1757+
return (target >= 0 && target < code_length && code_data[target] >= 0);
1758+
}
1759+
1760+
/* Given a bci and offset, make sure the offset is valid and the target is legal */
1761+
static jboolean
1762+
isLegalOffset(context_type *context, int bci, int offset)
17501763
{
17511764
int code_length = context->code_length;
17521765
int *code_data = context->code_data;
1753-
return (offset >= 0 && offset < code_length && code_data[offset] >= 0);
1766+
int max_offset = 65535; // JVMS 4.11
1767+
int min_offset = -65535;
1768+
if (offset < min_offset || offset > max_offset) return JNI_FALSE;
1769+
int target = bci + offset;
1770+
return (target >= 0 && target < code_length && code_data[target] >= 0);
17541771
}
17551772

17561773

src/java.xml/share/classes/com/sun/org/apache/xerces/internal/jaxp/DocumentBuilderFactoryImpl.java

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@
4141
/**
4242
* @author Rajiv Mordani
4343
* @author Edwin Goei
44-
* @LastModified: May 2025
44+
* @LastModified: June 2025
4545
*/
4646
public class DocumentBuilderFactoryImpl extends DocumentBuilderFactory {
4747
/** These are DocumentBuilderFactory attributes not DOM attributes */
@@ -59,11 +59,24 @@ public class DocumentBuilderFactoryImpl extends DocumentBuilderFactory {
5959
XMLSecurityManager fSecurityManager;
6060
XMLSecurityPropertyManager fSecurityPropertyMgr;
6161

62+
/**
63+
* Creates a new {@code DocumentBuilderFactory} instance.
64+
*/
6265
public DocumentBuilderFactoryImpl() {
66+
this(null, null);
67+
}
68+
69+
/**
70+
* Creates a new {@code DocumentBuilderFactory} instance with a {@code XMLSecurityManager}
71+
* and {@code XMLSecurityPropertyManager}.
72+
* @param xsm the {@code XMLSecurityManager}
73+
* @param xspm the {@code XMLSecurityPropertyManager}
74+
*/
75+
public DocumentBuilderFactoryImpl(XMLSecurityManager xsm, XMLSecurityPropertyManager xspm) {
6376
JdkXmlConfig config = JdkXmlConfig.getInstance(false);
6477
// security (property) managers updated with current system properties
65-
fSecurityManager = config.getXMLSecurityManager(true);
66-
fSecurityPropertyMgr = config.getXMLSecurityPropertyManager(true);
78+
fSecurityManager = (xsm == null) ? config.getXMLSecurityManager(true) : xsm;
79+
fSecurityPropertyMgr = (xspm == null) ? config.getXMLSecurityPropertyManager(true) : xspm;
6780
}
6881

6982
/**

0 commit comments

Comments
 (0)