On 14/09/2018 18:52, Alan Bateman wrote:
Core reflection has a filtering mechanism to hide a number of fields that are critical to security or the integrity of the runtime. It's a bit of a band aid but it helps to reduce hacking on fields such as java.lang.System.security and java.lang.Class.classLoder. I'd like to extend the filters to hide a few additional fields from integrity-sensitive (and non-serializable) classes in java.lang.reflect and java.lang.invoke. There are of course a number of nasty hacks around that might break due to this but these hacks would be broken anyway with simple rename or other innocent refactoring (we had some of this during JDK 11 when Mandy fixed JDK-8202113 for example).

The webrev with the changes is here:
   https://bugs.openjdk.java.net/browse/JDK-8210496
Sorry, that is the JBS issue, the webrev is here:
   http://cr.openjdk.java.net/~alanb/8210496/webrev/index.html

-Alan

Reply via email to