1 --- src/freenet/node/Node.java 2010-11-10 21:58:45.000000000 +0100
2 +++ src/freenet/node/Node.java.new 2010-11-10 21:59:53.000000000 +0100
3 @@ -3792,42 +3792,42 @@
5 boolean isOpenJDK = false;
7 - if(jvmName.startsWith("OpenJDK ")) {
9 - if(javaVersion.startsWith("1.6.0")) {
10 - String subverString;
11 - if(jvmVersion.startsWith("14.0-b"))
12 - subverString = jvmVersion.substring("14.0-b".length());
13 - else if(jvmVersion.startsWith("1.6.0_0-b"))
14 - subverString = jvmVersion.substring("1.6.0_0-b".length());
16 - subverString = null;
17 - if(subverString != null) {
20 - subver = Integer.parseInt(subverString);
21 - } catch (NumberFormatException e) {
24 - if(subver > -1 && subver < 15) {
25 - File javaDir = new File(System.getProperty("java.home"));
27 - // Assume that if the java home dir has been updated since August 11th, we have the fix.
29 - final Calendar _cal = Calendar.getInstance(TimeZone.getTimeZone("GMT"));
30 - _cal.set(2009, Calendar.AUGUST, 11, 0, 0, 0);
31 - if(javaDir.exists() && javaDir.isDirectory() && javaDir.lastModified() > _cal.getTimeInMillis()) {
32 - System.err.println("Your Java appears to have been updated, we probably do not have the XML bug (http://www.cert.fi/en/reports/2009/vulnerability2009085.html).");
34 - System.err.println("Old version of OpenJDK detected. It is possible that your Java may be vulnerable to a remote code execution vulnerability. Please update your operating system ASAP. We will not disable plugins because we cannot be sure whether there is a problem.");
35 - System.err.println("See here: http://www.cert.fi/en/reports/2009/vulnerability2009085.html");
36 - clientCore.alerts.register(new SimpleUserAlert(false, l10n("openJDKMightBeVulnerableXML"), l10n("openJDKMightBeVulnerableXML"), l10n("openJDKMightBeVulnerableXML"), UserAlert.ERROR));
43 +// if(jvmName.startsWith("OpenJDK ")) {
45 +// if(javaVersion.startsWith("1.6.0")) {
46 +// String subverString;
47 +// if(jvmVersion.startsWith("14.0-b"))
48 +// subverString = jvmVersion.substring("14.0-b".length());
49 +// else if(jvmVersion.startsWith("1.6.0_0-b"))
50 +// subverString = jvmVersion.substring("1.6.0_0-b".length());
52 +// subverString = null;
53 +// if(subverString != null) {
56 +// subver = Integer.parseInt(subverString);
57 +// } catch (NumberFormatException e) {
60 +// if(subver > -1 && subver < 15) {
61 +// File javaDir = new File(System.getProperty("java.home"));
63 +// // Assume that if the java home dir has been updated since August 11th, we have the fix.
65 +// final Calendar _cal = Calendar.getInstance(TimeZone.getTimeZone("GMT"));
66 +// _cal.set(2009, Calendar.AUGUST, 11, 0, 0, 0);
67 +// if(javaDir.exists() && javaDir.isDirectory() && javaDir.lastModified() > _cal.getTimeInMillis()) {
68 +// System.err.println("Your Java appears to have been updated, we probably do not have the XML bug (http://www.cert.fi/en/reports/2009/vulnerability2009085.html).");
70 +// System.err.println("Old version of OpenJDK detected. It is possible that your Java may be vulnerable to a remote code execution vulnerability. Please update your operating system ASAP. We will not disable plugins because we cannot be sure whether there is a problem.");
71 +// System.err.println("See here: http://www.cert.fi/en/reports/2009/vulnerability2009085.html");
72 +// clientCore.alerts.register(new SimpleUserAlert(false, l10n("openJDKMightBeVulnerableXML"), l10n("openJDKMightBeVulnerableXML"), l10n("openJDKMightBeVulnerableXML"), UserAlert.ERROR));
80 if(logMINOR) Logger.minor(this, "JVM vendor: "+jvmVendor+", JVM name: "+jvmName+", JVM version: "+javaVersion+", OS name: "+osName+", OS version: "+osVersion);