--- old/src/java.base/share/classes/java/lang/RuntimePermission.java 2017-07-11 14:33:39.772385099 -0700
+++ new/src/java.base/share/classes/java/lang/RuntimePermission.java 2017-07-11 14:33:39.568376198 -0700
@@ -48,15 +48,15 @@
* what the target allows, and associated risks
*
*
- * Permission Target Name |
- * What the Permission Allows |
- * Risks of Allowing this Permission |
+ * Permission Target Name |
+ * What the Permission Allows |
+ * Risks of Allowing this Permission |
*
*
*
*
*
- * createClassLoader |
+ * createClassLoader |
* Creation of a class loader |
* This is an extremely dangerous permission to grant.
* Malicious applications that can instantiate their own class
@@ -67,7 +67,7 @@
* |
*
*
- * getClassLoader |
+ * getClassLoader |
* Retrieval of a class loader (e.g., the class loader for the calling
* class) |
* This would grant an attacker permission to get the
@@ -78,7 +78,7 @@
* |
*
*
- * setContextClassLoader |
+ * setContextClassLoader |
* Setting of the context class loader used by a thread |
* The context class loader is used by system code and extensions
* when they need to lookup resources that might not exist in the system
@@ -88,7 +88,7 @@
* |
*
*
- * enableContextClassLoaderOverride |
+ * enableContextClassLoaderOverride |
* Subclass implementation of the thread context class loader methods |
* The context class loader is used by system code and extensions
* when they need to lookup resources that might not exist in the system
@@ -98,14 +98,14 @@
* |
*
*
- * closeClassLoader |
+ * closeClassLoader |
* Closing of a ClassLoader |
* Granting this permission allows code to close any URLClassLoader
* that it has a reference to. |
*
*
*
- * setSecurityManager |
+ * setSecurityManager |
* Setting of the security manager (possibly replacing an existing one)
* |
* The security manager is a class that allows
@@ -117,14 +117,14 @@
* |
*
*
- * createSecurityManager |
+ * createSecurityManager |
* Creation of a new security manager |
* This gives code access to protected, sensitive methods that may
* disclose information about other classes or the execution stack. |
*
*
*
- * getenv.{variable name} |
+ * getenv.{variable name} |
* Reading of the value of the specified environment variable |
* This would allow code to read the value, or determine the
* existence, of a particular environment variable. This is
@@ -132,7 +132,7 @@
* |
*
*
- * exitVM.{exit status} |
+ * exitVM.{exit status} |
* Halting of the Java Virtual Machine with the specified exit status |
* This allows an attacker to mount a denial-of-service attack
* by automatically forcing the virtual machine to halt.
@@ -143,14 +143,14 @@
* |
*
*
- * shutdownHooks |
+ * shutdownHooks |
* Registration and cancellation of virtual-machine shutdown hooks |
* This allows an attacker to register a malicious shutdown
* hook that interferes with the clean shutdown of the virtual machine. |
*
*
*
- * setFactory |
+ * setFactory |
* Setting of the socket factory used by ServerSocket or Socket,
* or of the stream handler factory used by URL |
* This allows code to set the actual implementation
@@ -160,7 +160,7 @@
* |
*
*
- * setIO |
+ * setIO |
* Setting of System.out, System.in, and System.err |
* This allows changing the value of the standard system streams.
* An attacker may change System.in to monitor and
@@ -169,7 +169,7 @@
* |
*
*
- * modifyThread |
+ * modifyThread |
* Modification of threads, e.g., via calls to Thread
* {@code interrupt, stop, suspend, resume, setDaemon, setPriority,
* setName} and {@code setUncaughtExceptionHandler}
@@ -179,7 +179,7 @@
* |
*
*
- * stopThread |
+ * stopThread |
* Stopping of threads via calls to the Thread stop
* method |
* This allows code to stop any thread in the system provided that it is
@@ -189,7 +189,7 @@
* |
*
*
- * modifyThreadGroup |
+ * modifyThreadGroup |
* modification of thread groups, e.g., via calls to ThreadGroup
* destroy , getParent , resume ,
* setDaemon , setMaxPriority , stop ,
@@ -199,7 +199,7 @@
* |
*
*
- * getProtectionDomain |
+ * getProtectionDomain |
* Retrieval of the ProtectionDomain for a class |
* This allows code to obtain policy information
* for a particular code source. While obtaining policy information
@@ -209,7 +209,7 @@
* |
*
*
- * getFileSystemAttributes |
+ * getFileSystemAttributes |
* Retrieval of file system attributes |
* This allows code to obtain file system information such as disk usage
* or disk space available to the caller. This is potentially dangerous
@@ -219,7 +219,7 @@
* |
*
*
- * readFileDescriptor |
+ * readFileDescriptor |
* Reading of file descriptors |
* This would allow code to read the particular file associated
* with the file descriptor read. This is dangerous if the file
@@ -227,7 +227,7 @@
* |
*
*
- * writeFileDescriptor |
+ * writeFileDescriptor |
* Writing to file descriptors |
* This allows code to write to a particular file associated
* with the descriptor. This is dangerous because it may allow
@@ -236,7 +236,7 @@
* |
*
*
- * loadLibrary.{library name} |
+ * loadLibrary.{library name} |
* Dynamic linking of the specified library |
* It is dangerous to allow an applet permission to load native code
* libraries, because the Java security architecture is not designed to and
@@ -244,7 +244,7 @@
* |
*
*
- * accessClassInPackage.{package name} |
+ * accessClassInPackage.{package name} |
* Access to the specified package via a class loader's
* loadClass method when that class loader calls
* the SecurityManager checkPackageAccess method |
@@ -255,7 +255,7 @@
*
*
*
- * defineClassInPackage.{package name} |
+ * defineClassInPackage.{package name} |
* Definition of classes in the specified package, via a class
* loader's defineClass method when that class loader calls
* the SecurityManager checkPackageDefinition method. |
@@ -267,7 +267,7 @@
*
*
*
- * defineClass |
+ * defineClass |
* Define a class with
* {@link java.lang.invoke.MethodHandles.Lookup#defineClass(byte[])
* Lookup.defineClass}. |
@@ -277,7 +277,7 @@
*
*
*
- * accessDeclaredMembers |
+ * accessDeclaredMembers |
* Access to the declared members of a class |
* This grants code permission to query a class for its public,
* protected, default (package) access, and private fields and/or
@@ -295,14 +295,14 @@
|
*
*
- * queuePrintJob |
+ * queuePrintJob |
* Initiation of a print job request |
* This could print sensitive information to a printer,
* or simply waste paper. |
*
*
*
- * getStackTrace |
+ * getStackTrace |
* Retrieval of the stack trace information of another thread. |
* This allows retrieval of the stack trace information of
* another thread. This might allow malicious code to monitor the
@@ -310,7 +310,7 @@
* |
*
*
- * getStackWalkerWithClassReference |
+ * getStackWalkerWithClassReference |
* Get a stack walker that can retrieve stack frames with class reference. |
* This allows retrieval of Class objects from stack walking.
* This might allow malicious code to access Class objects on the stack
@@ -318,7 +318,7 @@
* |
*
*
- * setDefaultUncaughtExceptionHandler |
+ * setDefaultUncaughtExceptionHandler |
* Setting the default handler to be used when a thread
* terminates abruptly due to an uncaught exception |
* This allows an attacker to register a malicious
@@ -327,7 +327,7 @@
* |
*
*
- * preferences |
+ * preferences |
* Represents the permission required to get access to the
* java.util.prefs.Preferences implementations user or system root
* which in turn allows retrieval or update operations within the
@@ -340,14 +340,14 @@
* |
*
*
- * manageProcess |
+ * manageProcess |
* Native process termination and information about processes
* {@link ProcessHandle}. |
* Allows code to identify and terminate processes that it did not create. |
*
*
*
- * localeServiceProvider |
+ * localeServiceProvider |
* This {@code RuntimePermission} is required to be granted to
* classes which subclass and implement
* {@code java.util.spi.LocaleServiceProvider}. The permission is
@@ -360,7 +360,7 @@
* |
*
*
- * loggerFinder |
+ * loggerFinder |
* This {@code RuntimePermission} is required to be granted to
* classes which subclass or call methods on
* {@code java.lang.System.LoggerFinder}. The permission is
@@ -373,7 +373,7 @@
* |
*
*
- * accessSystemModules |
+ * accessSystemModules |
* Access system modules in the runtime image. |
* This grants the permission to access resources in the
* {@linkplain ModuleFinder#ofSystem system modules} in the runtime image. |