Hi Michael,

Please share a working copy of the code to duplicate the failure scenario of 
NPE related to Connection.java. BTW, I checked the stack trace posted on April 
28 it did not clearly show Connection::cleanup got called. Was there something 
missed?

Thank you,
Weibing

From: security-dev <security-dev-r...@openjdk.org> on behalf of 
security-dev-requ...@openjdk.org <security-dev-requ...@openjdk.org>
Date: Tuesday, April 29, 2025 at 4:54 AM
To: security-dev@openjdk.org <security-dev@openjdk.org>
Subject: security-dev Digest, Vol 214, Issue 151
Send security-dev mailing list submissions to
        security-dev@openjdk.org

To subscribe or unsubscribe via the World Wide Web, visit
        https://mail.openjdk.org/mailman/listinfo/security-dev
or, via email, send a message with subject or body 'help' to
        security-dev-requ...@openjdk.org

You can reach the person managing the list at
        security-dev-ow...@openjdk.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of security-dev digest..."


Today's Topics:

   1. Re: RFR: 8350498: Remove two Camerfirma root CA certificates
      (Mark Powers)
   2. Re: RFR: 8354305: SHAKE128 and SHAKE256 MessageDigest
      algorithms [v3] (Valerie Peng)
   3. Re: [Bug] NPE thrown from SASL GSSAPI impl on Java 11+ when
      TLS is used with QOP auth-int against Active Directory
      (Osipov, Michael (IN IT IN))


----------------------------------------------------------------------

Message: 1
Date: Tue, 29 Apr 2025 01:21:44 GMT
From: Mark Powers <mpow...@openjdk.org>
To: <security-dev@openjdk.org>
Subject: Re: RFR: 8350498: Remove two Camerfirma root CA certificates
Message-ID:
        
<A9eAJBJDaHecIKxXaVFN1OYPI3klaPxL5AkWVbC39Eg=.23a9c6ce-9cf2-4d30-94e2-5bc9f9a2f...@github.com>

Content-Type: text/plain; charset=utf-8

On Tue, 22 Apr 2025 20:27:04 GMT, Rajan Halade <rhal...@openjdk.org> wrote:

> The change is to remove two Camerfirma root certificates which are terminated 
> and no longer in use. These two roots are removed from `cacerts` truststore. 
> Distrust of these roots is also removed as these roots will no longer be 
> trusted by JDK by default.
>
> The release-note is at 
> [JDK-8355325](https://bugs.openjdk.org/browse/JDK-8355325)

This looks good to me.

-------------

PR Comment: https://git.openjdk.org/jdk/pull/24800#issuecomment-2837171301


------------------------------

Message: 2
Date: Tue, 29 Apr 2025 01:41:44 GMT
From: Valerie Peng <valer...@openjdk.org>
To: <security-dev@openjdk.org>
Subject: Re: RFR: 8354305: SHAKE128 and SHAKE256 MessageDigest
        algorithms [v3]
Message-ID:
        
<7tQk66i69YQpgGj4_thPeRH0Dvx3Z5ohyzefcsLL7wA=.b11500ea-08b1-4961-b65d-e68082b56...@github.com>

Content-Type: text/plain; charset=utf-8

On Mon, 28 Apr 2025 14:48:34 GMT, Weijun Wang <wei...@openjdk.org> wrote:

>> Add 2 `MessageDigest` algorithms.
>
> Weijun Wang has updated the pull request incrementally with one additional 
> commit since the last revision:
>
>   test alias usage

Changes look fine. However, we should probably caution about these being 
different from the regular message digest algorithms, i.e. regarding their 
related output property.

-------------

Marked as reviewed by valeriep (Reviewer).

PR Review: https://git.openjdk.org/jdk/pull/24576#pullrequestreview-2801570550


------------------------------

Message: 3
Date: Tue, 29 Apr 2025 10:54:31 +0200
From: "Osipov, Michael (IN IT IN)" <michael.osi...@innomotics.com>
To: security-dev@openjdk.org
Cc: andre...@openjdk.org
Subject: Re: [Bug] NPE thrown from SASL GSSAPI impl on Java 11+ when
        TLS is used with QOP auth-int against Active Directory
Message-ID: <9baba8d6-066a-42cd-9649-e16033108...@siemens.com>
Content-Type: text/plain; charset=UTF-8; format=flowed

On 2025-04-28 10:22, Osipov, Michael (IN IT IN) wrote:
 > Hi folks,
 > Hi Max,
 >
 > please assess the following bug I have found in Java 11+, it does not
exist
 > in Java 8. I have tried the following most versions on Azul Zulu/
 > OpenJDK: 8, 11, 17, 21, 24 on multiple platforms. Searched JBS as well,
 > nothing found.

I was able to debug this and find the cause.
It is a regression from
https://github.com/openjdk/jdk11u/commit/bcac47f00ac6cf511ad7709fb9d39276ac27b049,
introduced with https://bugs.openjdk.org/browse/JDK-8313657.
I can even reproduce this with the HPE JDK 8 for HP-UX, so I guess they
have backported that broken fix.

Connection#flushAndCloseOutputStream() closes the SaslOutputStream()
which disposes the GSS security context and sets it to null. After that
Connection#abandonRequest(LdapRequest, Control[]) is invoked which still
uses the SaslOutputStream:
 >             synchronized (this) {
 >                 outStream.write(ber.getBuf(), 0, ber.getDataLen());
 >                 outStream.flush();
 >             }

Andrew,

can you log a bug here?

Michael


End of security-dev Digest, Vol 214, Issue 151
**********************************************

Reply via email to