View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/openjdk-8
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/debian/dsc 2019-10-18 05:18:16 UTC 2019-10-18
DSC file for 8u232-b09-1

Author: Ubuntu Git Importer
Author Date: 2019-10-18 05:18:16 UTC

DSC file for 8u232-b09-1

applied/debian/sid 2019-10-18 04:39:37 UTC 2019-10-18
Import patches-applied version 8u232-b09-1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2019-10-17 20:41:19 UTC

Import patches-applied version 8u232-b09-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4056f0a9a74b2223b615f02d6993e0df93d5ea6e
Unapplied parent: 939ce8ffa7fd07dff47da480ab19e24f6a8ff100

New changelog entries:
  * Update to 8u222-b09 (release build).
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations.

debian/sid 2019-10-18 04:39:37 UTC 2019-10-18
Import patches-unapplied version 8u232-b09-1 to debian/sid

Author: Matthias Klose
Author Date: 2019-10-17 20:41:19 UTC

Import patches-unapplied version 8u232-b09-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 9d97b3930dbff98f438a9bdfe86da7023864918a

New changelog entries:
  * Update to 8u222-b09 (release build).
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations.

importer/ubuntu/dsc 2019-10-16 04:47:51 UTC 2019-10-16
DSC file for 8u232-b09-0ubuntu1

Author: Ubuntu Git Importer
Author Date: 2019-10-16 04:47:51 UTC

DSC file for 8u232-b09-0ubuntu1

applied/ubuntu/eoan-devel 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-prop...

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: eb0f46ce1dce0b24f250a1c3a02e79e5a4eb3938
Unapplied parent: 1500d48c008de0547971fd460524af0fa69804a7

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

applied/ubuntu/eoan-proposed 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-prop...

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: eb0f46ce1dce0b24f250a1c3a02e79e5a4eb3938
Unapplied parent: 1500d48c008de0547971fd460524af0fa69804a7

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

applied/ubuntu/focal 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-prop...

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: eb0f46ce1dce0b24f250a1c3a02e79e5a4eb3938
Unapplied parent: 1500d48c008de0547971fd460524af0fa69804a7

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

ubuntu/eoan-proposed 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 590176a757866abb699a6e7fb0cf4cadca5b78e0

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

ubuntu/focal-devel 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 590176a757866abb699a6e7fb0cf4cadca5b78e0

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

ubuntu/devel 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 590176a757866abb699a6e7fb0cf4cadca5b78e0

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

ubuntu/eoan 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 590176a757866abb699a6e7fb0cf4cadca5b78e0

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

applied/ubuntu/focal-devel 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-prop...

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: eb0f46ce1dce0b24f250a1c3a02e79e5a4eb3938
Unapplied parent: 1500d48c008de0547971fd460524af0fa69804a7

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

applied/ubuntu/devel 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-prop...

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: eb0f46ce1dce0b24f250a1c3a02e79e5a4eb3938
Unapplied parent: 1500d48c008de0547971fd460524af0fa69804a7

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

ubuntu/eoan-devel 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 590176a757866abb699a6e7fb0cf4cadca5b78e0

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

applied/ubuntu/eoan 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-prop...

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-applied version 8u232-b09-0ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: eb0f46ce1dce0b24f250a1c3a02e79e5a4eb3938
Unapplied parent: 1500d48c008de0547971fd460524af0fa69804a7

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

ubuntu/focal 2019-10-16 04:03:13 UTC 2019-10-16
Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Author: Tiago Stürmer Daitx
Author Date: 2019-10-16 00:44:38 UTC

Import patches-unapplied version 8u232-b09-0ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 590176a757866abb699a6e7fb0cf4cadca5b78e0

New changelog entries:
  * Update to OpenJDK 8u232-b09 (GA). Updated aarch32 to 8u232-b08.
  * Security fixes:
    - S8167646: Better invalid FilePermission.
    - S8213429, CVE-2019-2933: Windows file handling redux.
    - S8218573, CVE-2019-2945: Better socket support.
    - S8218877: Help transform transformers.
    - S8220186: Improve use of font temporary files.
    - S8220302, CVE-2019-2949: Better Kerberos ccache handling.
    - S8221497: Optional Panes in Swing.
    - S8221858, CVE-2019-2958: Build Better Processes.
    - S8222684, CVE-2019-2964: Better support for patterns.
    - S8222690, CVE-2019-2962: Better Glyph Images.
    - S8223163: Better pattern recognition.
    - S8223505, CVE-2019-2973: Better pattern compilation.
    - S8223518, CVE-2019-2975: Unexpected exception in jjs.
    - S8223892, CVE-2019-2978: Improved handling of jar files.
    - S8224025: Fix for JDK-8220302 is not complete.
    - S8224532, CVE-2019-2981: Better Path supports.
    - S8224915, CVE-2019-2983: Better serial attributes.
    - S8225286, CVE-2019-2987: Better rendering of native glyphs.
    - S8225292, CVE-2019-2988: Better Graphics2D drawing.
    - S8225298, CVE-2019-2989: Improve TLS connection support.
    - S8225597, CVE-2019-2992: Enhance font glyph mapping.
    - S8226765, CVE-2019-2999: Commentary on Javadoc comments.
    - S8227129: Better ligature for subtables.
    - S8227601: Better collection of references.
    - S8228825, CVE-2019-2894: Enhance ECDSA operations .

debian/stretch 2019-09-07 18:01:14 UTC 2019-09-07
Import patches-unapplied version 8u222-b10-1~deb9u1 to debian/stretch

Author: Moritz Muehlenhoff
Author Date: 2019-07-19 16:57:48 UTC

Import patches-unapplied version 8u222-b10-1~deb9u1 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: ddaafcd879f8476a138abc6f5da03c4454192a64

New changelog entries:
  * Rebuild for stretch

applied/debian/stretch 2019-09-07 18:01:14 UTC 2019-09-07
Import patches-applied version 8u222-b10-1~deb9u1 to applied/debian/stretch

Author: Moritz Muehlenhoff
Author Date: 2019-07-19 16:57:48 UTC

Import patches-applied version 8u222-b10-1~deb9u1 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 914bcf4eb7b8219c13d3cb3473c81ed509d9c3be
Unapplied parent: 6b79e1582e9caf123a61f35b5b1bf53396462d88

New changelog entries:
  * Rebuild for stretch

debian/experimental 2019-09-06 22:26:59 UTC 2019-09-06
Import patches-unapplied version 8u232-b04-1 to debian/experimental

Author: Matthias Klose
Author Date: 2019-09-06 16:03:11 UTC

Import patches-unapplied version 8u232-b04-1 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: ddaafcd879f8476a138abc6f5da03c4454192a64

New changelog entries:
  * Update to 8u232-b04 (early access build).
  * Refresh patches.

applied/debian/experimental 2019-09-06 22:26:59 UTC 2019-09-06
Import patches-applied version 8u232-b04-1 to applied/debian/experimental

Author: Matthias Klose
Author Date: 2019-09-06 16:03:11 UTC

Import patches-applied version 8u232-b04-1 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 914bcf4eb7b8219c13d3cb3473c81ed509d9c3be
Unapplied parent: f7d20fde715e113874f36dd4e55a277348e86759

New changelog entries:
  * Update to 8u232-b04 (early access build).
  * Refresh patches.

ubuntu/bionic-devel 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-unapplied version 8u222-b10-1ubuntu1~18.04.1 to ubuntu/bionic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-unapplied version 8u222-b10-1ubuntu1~18.04.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/xenial-updates 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-applied version 8u222-b10-1ubuntu1~16.04.1 to applied/ubuntu/x...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-applied version 8u222-b10-1ubuntu1~16.04.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: a91ccc4e298f7c0c494debfeb88c7c7f6a1b2c54
Unapplied parent: 91ecfef53071d9fcbb486e95678b36b828d6c704

New changelog entries:
  * Backport from Eoan.

ubuntu/xenial-updates 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-unapplied version 8u222-b10-1ubuntu1~16.04.1 to ubuntu/xenial-...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-unapplied version 8u222-b10-1ubuntu1~16.04.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Backport from Eoan.

ubuntu/xenial-security 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-unapplied version 8u222-b10-1ubuntu1~16.04.1 to ubuntu/xenial-...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-unapplied version 8u222-b10-1ubuntu1~16.04.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Backport from Eoan.

ubuntu/xenial-devel 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-unapplied version 8u222-b10-1ubuntu1~16.04.1 to ubuntu/xenial-...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-unapplied version 8u222-b10-1ubuntu1~16.04.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/bionic-devel 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-applied version 8u222-b10-1ubuntu1~18.04.1 to applied/ubuntu/b...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-applied version 8u222-b10-1ubuntu1~18.04.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: a91ccc4e298f7c0c494debfeb88c7c7f6a1b2c54
Unapplied parent: 2871a1d3865d79f6c8ad0630aff55403ea247cf6

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/bionic-security 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-applied version 8u222-b10-1ubuntu1~18.04.1 to applied/ubuntu/b...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-applied version 8u222-b10-1ubuntu1~18.04.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: a91ccc4e298f7c0c494debfeb88c7c7f6a1b2c54
Unapplied parent: 2871a1d3865d79f6c8ad0630aff55403ea247cf6

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/bionic-updates 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-applied version 8u222-b10-1ubuntu1~18.04.1 to applied/ubuntu/b...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-applied version 8u222-b10-1ubuntu1~18.04.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: a91ccc4e298f7c0c494debfeb88c7c7f6a1b2c54
Unapplied parent: 2871a1d3865d79f6c8ad0630aff55403ea247cf6

New changelog entries:
  * Backport from Eoan.

ubuntu/disco-updates 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-unapplied version 8u222-b10-1ubuntu1~19.04.1 to ubuntu/disco-s...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-unapplied version 8u222-b10-1ubuntu1~19.04.1 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/disco-devel 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-applied version 8u222-b10-1ubuntu1~19.04.1 to applied/ubuntu/d...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-applied version 8u222-b10-1ubuntu1~19.04.1 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: a91ccc4e298f7c0c494debfeb88c7c7f6a1b2c54
Unapplied parent: 94e0c358e93f0448a78c6d43fdbb66d013d43148

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/disco-security 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-applied version 8u222-b10-1ubuntu1~19.04.1 to applied/ubuntu/d...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-applied version 8u222-b10-1ubuntu1~19.04.1 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: a91ccc4e298f7c0c494debfeb88c7c7f6a1b2c54
Unapplied parent: 94e0c358e93f0448a78c6d43fdbb66d013d43148

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/disco-updates 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-applied version 8u222-b10-1ubuntu1~19.04.1 to applied/ubuntu/d...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-applied version 8u222-b10-1ubuntu1~19.04.1 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: a91ccc4e298f7c0c494debfeb88c7c7f6a1b2c54
Unapplied parent: 94e0c358e93f0448a78c6d43fdbb66d013d43148

New changelog entries:
  * Backport from Eoan.

ubuntu/disco-security 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-unapplied version 8u222-b10-1ubuntu1~19.04.1 to ubuntu/disco-s...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-unapplied version 8u222-b10-1ubuntu1~19.04.1 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Backport from Eoan.

ubuntu/disco-devel 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-unapplied version 8u222-b10-1ubuntu1~19.04.1 to ubuntu/disco-s...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-unapplied version 8u222-b10-1ubuntu1~19.04.1 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Backport from Eoan.

ubuntu/bionic-updates 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-unapplied version 8u222-b10-1ubuntu1~18.04.1 to ubuntu/bionic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-unapplied version 8u222-b10-1ubuntu1~18.04.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Backport from Eoan.

ubuntu/bionic-security 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-unapplied version 8u222-b10-1ubuntu1~18.04.1 to ubuntu/bionic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-unapplied version 8u222-b10-1ubuntu1~18.04.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/xenial-security 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-applied version 8u222-b10-1ubuntu1~16.04.1 to applied/ubuntu/x...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-applied version 8u222-b10-1ubuntu1~16.04.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: a91ccc4e298f7c0c494debfeb88c7c7f6a1b2c54
Unapplied parent: 91ecfef53071d9fcbb486e95678b36b828d6c704

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/xenial-devel 2019-07-30 23:13:14 UTC 2019-07-30
Import patches-applied version 8u222-b10-1ubuntu1~16.04.1 to applied/ubuntu/x...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:52:48 UTC

Import patches-applied version 8u222-b10-1ubuntu1~16.04.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: a91ccc4e298f7c0c494debfeb88c7c7f6a1b2c54
Unapplied parent: 91ecfef53071d9fcbb486e95678b36b828d6c704

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/cosmic-devel 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/c...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 93fa43287a9b2c89f78b45809f1e7f1dc3b4c9e7

New changelog entries:
  * Backport from Eoan.

ubuntu/cosmic-updates 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.

ubuntu/cosmic-security 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.

ubuntu/cosmic-devel 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/cosmic-updates 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/c...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 93fa43287a9b2c89f78b45809f1e7f1dc3b4c9e7

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/cosmic-security 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/c...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 93fa43287a9b2c89f78b45809f1e7f1dc3b4c9e7

New changelog entries:
  * Backport from Eoan.

applied/debian/buster 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: be6fc80943901fa33a2ad0f01ad57483867b776f
Unapplied parent: bcf669cb3877011e0e8303d9ba80d03a73be2953

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

applied/ubuntu/disco 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: be6fc80943901fa33a2ad0f01ad57483867b776f
Unapplied parent: bcf669cb3877011e0e8303d9ba80d03a73be2953

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

applied/ubuntu/disco-proposed 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: be6fc80943901fa33a2ad0f01ad57483867b776f
Unapplied parent: bcf669cb3877011e0e8303d9ba80d03a73be2953

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

debian/buster 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: a8e02d5e9741cdd693e777c6d0a464d49d9c2f3d

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

ubuntu/disco 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: a8e02d5e9741cdd693e777c6d0a464d49d9c2f3d

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

ubuntu/disco-proposed 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: a8e02d5e9741cdd693e777c6d0a464d49d9c2f3d

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

ubuntu/cosmic-proposed 2018-08-04 16:35:05 UTC 2018-08-04
Import patches-unapplied version 8u181-b13-1 to debian/sid

Author: Matthias Klose
Author Date: 2018-08-04 12:10:33 UTC

Import patches-unapplied version 8u181-b13-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 1b8390461083c78e179e8ca6f1d728f028b73553

New changelog entries:
  * Update to 8u181-b13.
  * Remove the mauve test machinery.
  * Build using GCC 8 in development releases.

ubuntu/cosmic 2018-08-04 16:35:05 UTC 2018-08-04
Import patches-unapplied version 8u181-b13-1 to debian/sid

Author: Matthias Klose
Author Date: 2018-08-04 12:10:33 UTC

Import patches-unapplied version 8u181-b13-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 1b8390461083c78e179e8ca6f1d728f028b73553

New changelog entries:
  * Update to 8u181-b13.
  * Remove the mauve test machinery.
  * Build using GCC 8 in development releases.

applied/ubuntu/cosmic-proposed 2018-08-04 16:35:05 UTC 2018-08-04
Import patches-applied version 8u181-b13-1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2018-08-04 12:10:33 UTC

Import patches-applied version 8u181-b13-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: b0f3bf2d900b3df07a1281976987a590ed9d167e
Unapplied parent: d3d42527193fe7d5d54340f54d7ac6c1934d613d

New changelog entries:
  * Update to 8u181-b13.
  * Remove the mauve test machinery.
  * Build using GCC 8 in development releases.

applied/ubuntu/cosmic 2018-08-04 16:35:05 UTC 2018-08-04
Import patches-applied version 8u181-b13-1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2018-08-04 12:10:33 UTC

Import patches-applied version 8u181-b13-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: b0f3bf2d900b3df07a1281976987a590ed9d167e
Unapplied parent: d3d42527193fe7d5d54340f54d7ac6c1934d613d

New changelog entries:
  * Update to 8u181-b13.
  * Remove the mauve test machinery.
  * Build using GCC 8 in development releases.

ubuntu/artful-updates 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: a306516cd67c0a4ae8aff73e3395d2a792b31712

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

ubuntu/artful-security 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: a306516cd67c0a4ae8aff73e3395d2a792b31712

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

applied/ubuntu/artful-devel 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/a...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: db5b4ba3f4a04ed0b377bedee58d68811218872e
Unapplied parent: 1f4e1dccd38021f42609b43a7a617cb57bf51afe

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

ubuntu/artful-devel 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: a306516cd67c0a4ae8aff73e3395d2a792b31712

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

applied/ubuntu/artful-security 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/a...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: db5b4ba3f4a04ed0b377bedee58d68811218872e
Unapplied parent: 1f4e1dccd38021f42609b43a7a617cb57bf51afe

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

applied/ubuntu/artful-updates 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/a...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: db5b4ba3f4a04ed0b377bedee58d68811218872e
Unapplied parent: 1f4e1dccd38021f42609b43a7a617cb57bf51afe

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

importer/ubuntu/pristine-tar 2018-04-03 04:14:06 UTC 2018-04-03
pristine-tar data for openjdk-8_8u162-b12.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-03 04:14:06 UTC

pristine-tar data for openjdk-8_8u162-b12.orig.tar.xz

importer/debian/pristine-tar 2018-04-03 02:20:21 UTC 2018-04-03
pristine-tar data for openjdk-8_8u162-b12.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-03 02:20:21 UTC

pristine-tar data for openjdk-8_8u162-b12.orig.tar.xz

ubuntu/bionic 2018-03-15 22:34:53 UTC 2018-03-15
Import patches-unapplied version 8u162-b12-1 to debian/sid

Author: Matthias Klose
Author Date: 2018-03-15 17:19:50 UTC

Import patches-unapplied version 8u162-b12-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 577790c5bb412190f538d72474cd1707d0b81f09

New changelog entries:
  [ Tiago Stürmer Daitx ]
  * Update to 8u162-b12. Hotspot 8u162-b12 for aarch32 and 8u161-b16
    for aarch64 (wth 8u162-b12 patches).
  * Security updates:
    - CVE-2018-2633,S8186606: Improve LDAP lookup robustness.
    - CVE-2018-2637,S8186998: Improve JMX supportive features.
    - CVE-2018-2634,S8186600: Improve property negotiations.
    - CVE-2018-2582,S8174962: Better interface invocations.
    - CVE-2018-2641,S8185325: Improve GTK initialization.
    - CVE-2018-2618,S8185292: Stricter key generation.
    - CVE-2018-2629,S8186212: Improve GSS handling.
    - CVE-2018-2603,S8182387: Improve PKCS usage.
    - CVE-2018-2599,S8182125: Improve reliability of DNS lookups.
    - CVE-2018-2602,S8182601: Improve usage messages.
    - CVE-2018-2588,S8178449: Improve LDAP logins.
    - CVE-2018-2678,S8191142: More refactoring for naming deserialization
      cases.
    - CVE-2018-2677,S8190289: More refactoring for client deserialization
      cases.
    - CVE-2018-2663,S8189284: More refactoring for deserialization cases.
    - CVE-2018-2579,S8172525: Improve key keying case.
  * d/p/aarch64-hotspot-8u162-b12.patch: update aarch64 hotspot to 8u162-b12.
  * d/p/icedtea-4953367.patch: removed, fixed upstream by "S8136570: Stop
    changing user environment variables related to /usr/dt".
  * d/p/gcc6.diff: removed, fixed upstream.
  * d/p/jdk-getAccessibleValue.diff: updated, removed chunks fixed upstream
    by "S8076249: NPE in AccessBridge while editing JList model" and
    "S8145207: [macosx] JList, VO can't access non-visible list items".
  * d/p/openjdk-ppc64el-S8170153.patch, d/p/8164293.diff,
    d/p/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch,
    d/p/hotspot-ppc64el-S8168318-cmpldi.patch,
    d/p/hotspot-ppc64el-S8170328-andis.patch,
    d/p/hotspot-ppc64el-S8175813-mbind-invalid-argument.patch,
    d/p/hotspot-ppc64el-S8181055-use-numa-v2-api.patch,
    d/p/hotspot-ppc64el-S8181810-leverage-extrdi.patch: removed,
    applied upstream.
  * d/rules, d/control: depend on GKT3 instead of GTK2 for newer releases.
    LP: #1735482.
  * d/rules: wait 10 seconds before issuing SIGKILL to buildwatch.
  * d/buildwatch.sh: find hs_err files and cat them to help debugging build
    failures.
  * S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter.
    LP: #8173853.
  [ Matthias Klose ]
  * Disable Hotspot workaround for Exec Shield (Debian only).
    Closes: #876051.
  * Fix some lintian warnings.

applied/ubuntu/bionic-proposed 2018-03-15 22:34:53 UTC 2018-03-15
Import patches-applied version 8u162-b12-1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2018-03-15 17:19:50 UTC

Import patches-applied version 8u162-b12-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 7de299365c82d4cd9a0aa351c91144f9c84e7869
Unapplied parent: a306516cd67c0a4ae8aff73e3395d2a792b31712

New changelog entries:
  [ Tiago Stürmer Daitx ]
  * Update to 8u162-b12. Hotspot 8u162-b12 for aarch32 and 8u161-b16
    for aarch64 (wth 8u162-b12 patches).
  * Security updates:
    - CVE-2018-2633,S8186606: Improve LDAP lookup robustness.
    - CVE-2018-2637,S8186998: Improve JMX supportive features.
    - CVE-2018-2634,S8186600: Improve property negotiations.
    - CVE-2018-2582,S8174962: Better interface invocations.
    - CVE-2018-2641,S8185325: Improve GTK initialization.
    - CVE-2018-2618,S8185292: Stricter key generation.
    - CVE-2018-2629,S8186212: Improve GSS handling.
    - CVE-2018-2603,S8182387: Improve PKCS usage.
    - CVE-2018-2599,S8182125: Improve reliability of DNS lookups.
    - CVE-2018-2602,S8182601: Improve usage messages.
    - CVE-2018-2588,S8178449: Improve LDAP logins.
    - CVE-2018-2678,S8191142: More refactoring for naming deserialization
      cases.
    - CVE-2018-2677,S8190289: More refactoring for client deserialization
      cases.
    - CVE-2018-2663,S8189284: More refactoring for deserialization cases.
    - CVE-2018-2579,S8172525: Improve key keying case.
  * d/p/aarch64-hotspot-8u162-b12.patch: update aarch64 hotspot to 8u162-b12.
  * d/p/icedtea-4953367.patch: removed, fixed upstream by "S8136570: Stop
    changing user environment variables related to /usr/dt".
  * d/p/gcc6.diff: removed, fixed upstream.
  * d/p/jdk-getAccessibleValue.diff: updated, removed chunks fixed upstream
    by "S8076249: NPE in AccessBridge while editing JList model" and
    "S8145207: [macosx] JList, VO can't access non-visible list items".
  * d/p/openjdk-ppc64el-S8170153.patch, d/p/8164293.diff,
    d/p/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch,
    d/p/hotspot-ppc64el-S8168318-cmpldi.patch,
    d/p/hotspot-ppc64el-S8170328-andis.patch,
    d/p/hotspot-ppc64el-S8175813-mbind-invalid-argument.patch,
    d/p/hotspot-ppc64el-S8181055-use-numa-v2-api.patch,
    d/p/hotspot-ppc64el-S8181810-leverage-extrdi.patch: removed,
    applied upstream.
  * d/rules, d/control: depend on GKT3 instead of GTK2 for newer releases.
    LP: #1735482.
  * d/rules: wait 10 seconds before issuing SIGKILL to buildwatch.
  * d/buildwatch.sh: find hs_err files and cat them to help debugging build
    failures.
  * S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter.
    LP: #8173853.
  [ Matthias Klose ]
  * Disable Hotspot workaround for Exec Shield (Debian only).
    Closes: #876051.
  * Fix some lintian warnings.

applied/ubuntu/bionic 2018-03-15 22:34:53 UTC 2018-03-15
Import patches-applied version 8u162-b12-1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2018-03-15 17:19:50 UTC

Import patches-applied version 8u162-b12-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 7de299365c82d4cd9a0aa351c91144f9c84e7869
Unapplied parent: a306516cd67c0a4ae8aff73e3395d2a792b31712

New changelog entries:
  [ Tiago Stürmer Daitx ]
  * Update to 8u162-b12. Hotspot 8u162-b12 for aarch32 and 8u161-b16
    for aarch64 (wth 8u162-b12 patches).
  * Security updates:
    - CVE-2018-2633,S8186606: Improve LDAP lookup robustness.
    - CVE-2018-2637,S8186998: Improve JMX supportive features.
    - CVE-2018-2634,S8186600: Improve property negotiations.
    - CVE-2018-2582,S8174962: Better interface invocations.
    - CVE-2018-2641,S8185325: Improve GTK initialization.
    - CVE-2018-2618,S8185292: Stricter key generation.
    - CVE-2018-2629,S8186212: Improve GSS handling.
    - CVE-2018-2603,S8182387: Improve PKCS usage.
    - CVE-2018-2599,S8182125: Improve reliability of DNS lookups.
    - CVE-2018-2602,S8182601: Improve usage messages.
    - CVE-2018-2588,S8178449: Improve LDAP logins.
    - CVE-2018-2678,S8191142: More refactoring for naming deserialization
      cases.
    - CVE-2018-2677,S8190289: More refactoring for client deserialization
      cases.
    - CVE-2018-2663,S8189284: More refactoring for deserialization cases.
    - CVE-2018-2579,S8172525: Improve key keying case.
  * d/p/aarch64-hotspot-8u162-b12.patch: update aarch64 hotspot to 8u162-b12.
  * d/p/icedtea-4953367.patch: removed, fixed upstream by "S8136570: Stop
    changing user environment variables related to /usr/dt".
  * d/p/gcc6.diff: removed, fixed upstream.
  * d/p/jdk-getAccessibleValue.diff: updated, removed chunks fixed upstream
    by "S8076249: NPE in AccessBridge while editing JList model" and
    "S8145207: [macosx] JList, VO can't access non-visible list items".
  * d/p/openjdk-ppc64el-S8170153.patch, d/p/8164293.diff,
    d/p/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch,
    d/p/hotspot-ppc64el-S8168318-cmpldi.patch,
    d/p/hotspot-ppc64el-S8170328-andis.patch,
    d/p/hotspot-ppc64el-S8175813-mbind-invalid-argument.patch,
    d/p/hotspot-ppc64el-S8181055-use-numa-v2-api.patch,
    d/p/hotspot-ppc64el-S8181810-leverage-extrdi.patch: removed,
    applied upstream.
  * d/rules, d/control: depend on GKT3 instead of GTK2 for newer releases.
    LP: #1735482.
  * d/rules: wait 10 seconds before issuing SIGKILL to buildwatch.
  * d/buildwatch.sh: find hs_err files and cat them to help debugging build
    failures.
  * S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter.
    LP: #8173853.
  [ Matthias Klose ]
  * Disable Hotspot workaround for Exec Shield (Debian only).
    Closes: #876051.
  * Fix some lintian warnings.

ubuntu/bionic-proposed 2018-03-15 22:34:53 UTC 2018-03-15
Import patches-unapplied version 8u162-b12-1 to debian/sid

Author: Matthias Klose
Author Date: 2018-03-15 17:19:50 UTC

Import patches-unapplied version 8u162-b12-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 577790c5bb412190f538d72474cd1707d0b81f09

New changelog entries:
  [ Tiago Stürmer Daitx ]
  * Update to 8u162-b12. Hotspot 8u162-b12 for aarch32 and 8u161-b16
    for aarch64 (wth 8u162-b12 patches).
  * Security updates:
    - CVE-2018-2633,S8186606: Improve LDAP lookup robustness.
    - CVE-2018-2637,S8186998: Improve JMX supportive features.
    - CVE-2018-2634,S8186600: Improve property negotiations.
    - CVE-2018-2582,S8174962: Better interface invocations.
    - CVE-2018-2641,S8185325: Improve GTK initialization.
    - CVE-2018-2618,S8185292: Stricter key generation.
    - CVE-2018-2629,S8186212: Improve GSS handling.
    - CVE-2018-2603,S8182387: Improve PKCS usage.
    - CVE-2018-2599,S8182125: Improve reliability of DNS lookups.
    - CVE-2018-2602,S8182601: Improve usage messages.
    - CVE-2018-2588,S8178449: Improve LDAP logins.
    - CVE-2018-2678,S8191142: More refactoring for naming deserialization
      cases.
    - CVE-2018-2677,S8190289: More refactoring for client deserialization
      cases.
    - CVE-2018-2663,S8189284: More refactoring for deserialization cases.
    - CVE-2018-2579,S8172525: Improve key keying case.
  * d/p/aarch64-hotspot-8u162-b12.patch: update aarch64 hotspot to 8u162-b12.
  * d/p/icedtea-4953367.patch: removed, fixed upstream by "S8136570: Stop
    changing user environment variables related to /usr/dt".
  * d/p/gcc6.diff: removed, fixed upstream.
  * d/p/jdk-getAccessibleValue.diff: updated, removed chunks fixed upstream
    by "S8076249: NPE in AccessBridge while editing JList model" and
    "S8145207: [macosx] JList, VO can't access non-visible list items".
  * d/p/openjdk-ppc64el-S8170153.patch, d/p/8164293.diff,
    d/p/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch,
    d/p/hotspot-ppc64el-S8168318-cmpldi.patch,
    d/p/hotspot-ppc64el-S8170328-andis.patch,
    d/p/hotspot-ppc64el-S8175813-mbind-invalid-argument.patch,
    d/p/hotspot-ppc64el-S8181055-use-numa-v2-api.patch,
    d/p/hotspot-ppc64el-S8181810-leverage-extrdi.patch: removed,
    applied upstream.
  * d/rules, d/control: depend on GKT3 instead of GTK2 for newer releases.
    LP: #1735482.
  * d/rules: wait 10 seconds before issuing SIGKILL to buildwatch.
  * d/buildwatch.sh: find hs_err files and cat them to help debugging build
    failures.
  * S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter.
    LP: #8173853.
  [ Matthias Klose ]
  * Disable Hotspot workaround for Exec Shield (Debian only).
    Closes: #876051.
  * Fix some lintian warnings.

ubuntu/zesty-security 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-s...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: ffd97cb5086477058b5181c1c126e0fc4a9f765e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

applied/ubuntu/zesty-updates 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/z...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 9d42834938b8664510175b690e4a2390bf3a3b31
Unapplied parent: ca107c44190d8cc93b67a451cdfda6ed10023c8e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

applied/ubuntu/zesty-security 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/z...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 9d42834938b8664510175b690e4a2390bf3a3b31
Unapplied parent: ca107c44190d8cc93b67a451cdfda6ed10023c8e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

applied/ubuntu/zesty-devel 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/z...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 9d42834938b8664510175b690e4a2390bf3a3b31
Unapplied parent: ca107c44190d8cc93b67a451cdfda6ed10023c8e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

ubuntu/zesty-updates 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-s...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: ffd97cb5086477058b5181c1c126e0fc4a9f765e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

ubuntu/zesty-devel 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-s...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: ffd97cb5086477058b5181c1c126e0fc4a9f765e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

ubuntu/artful 2017-09-30 04:34:08 UTC 2017-09-30
Import patches-unapplied version 8u144-b01-2 to debian/sid

Author: Matthias Klose
Author Date: 2017-09-30 00:37:14 UTC

Import patches-unapplied version 8u144-b01-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: af976799a7dc5d59fa8fce5cd3c6fa4c178c45ac

New changelog entries:
  [ Matthias Klose ]
  * Don't regenerate the control file during the build.
  * Enable systemtap on sh4.
  * Bump standards version to 4.1.0.
  * Build using GCC 7 on recent development versions.
  [ Tiago Stürmer Daitx ]
  * debian/rules:
    - when zero/shark alternate vm is build, add '-zero KNOWN' to jvm.cfg.
    - for non-hotspot builds add '-zero ALIASED_TO -server' to jvm.cfg.
    - enable zero alternate vm on armhf.
  * debian/jvm.cfg-client_default: aarch32 only builds the client
    compiler and requires its own default jvm. Closes: #874434.

ubuntu/artful-proposed 2017-09-30 04:34:08 UTC 2017-09-30
Import patches-unapplied version 8u144-b01-2 to debian/sid

Author: Matthias Klose
Author Date: 2017-09-30 00:37:14 UTC

Import patches-unapplied version 8u144-b01-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: af976799a7dc5d59fa8fce5cd3c6fa4c178c45ac

New changelog entries:
  [ Matthias Klose ]
  * Don't regenerate the control file during the build.
  * Enable systemtap on sh4.
  * Bump standards version to 4.1.0.
  * Build using GCC 7 on recent development versions.
  [ Tiago Stürmer Daitx ]
  * debian/rules:
    - when zero/shark alternate vm is build, add '-zero KNOWN' to jvm.cfg.
    - for non-hotspot builds add '-zero ALIASED_TO -server' to jvm.cfg.
    - enable zero alternate vm on armhf.
  * debian/jvm.cfg-client_default: aarch32 only builds the client
    compiler and requires its own default jvm. Closes: #874434.

applied/ubuntu/artful 2017-09-30 04:34:08 UTC 2017-09-30
Import patches-applied version 8u144-b01-2 to applied/debian/sid

Author: Matthias Klose
Author Date: 2017-09-30 00:37:14 UTC

Import patches-applied version 8u144-b01-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 7edb06d22e3ace6b17b6d122e62fdb002e6fe737
Unapplied parent: ffd97cb5086477058b5181c1c126e0fc4a9f765e

New changelog entries:
  [ Matthias Klose ]
  * Don't regenerate the control file during the build.
  * Enable systemtap on sh4.
  * Bump standards version to 4.1.0.
  * Build using GCC 7 on recent development versions.
  [ Tiago Stürmer Daitx ]
  * debian/rules:
    - when zero/shark alternate vm is build, add '-zero KNOWN' to jvm.cfg.
    - for non-hotspot builds add '-zero ALIASED_TO -server' to jvm.cfg.
    - enable zero alternate vm on armhf.
  * debian/jvm.cfg-client_default: aarch32 only builds the client
    compiler and requires its own default jvm. Closes: #874434.

applied/ubuntu/artful-proposed 2017-09-30 04:34:08 UTC 2017-09-30
Import patches-applied version 8u144-b01-2 to applied/debian/sid

Author: Matthias Klose
Author Date: 2017-09-30 00:37:14 UTC

Import patches-applied version 8u144-b01-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 7edb06d22e3ace6b17b6d122e62fdb002e6fe737
Unapplied parent: ffd97cb5086477058b5181c1c126e0fc4a9f765e

New changelog entries:
  [ Matthias Klose ]
  * Don't regenerate the control file during the build.
  * Enable systemtap on sh4.
  * Bump standards version to 4.1.0.
  * Build using GCC 7 on recent development versions.
  [ Tiago Stürmer Daitx ]
  * debian/rules:
    - when zero/shark alternate vm is build, add '-zero KNOWN' to jvm.cfg.
    - for non-hotspot builds add '-zero ALIASED_TO -server' to jvm.cfg.
    - enable zero alternate vm on armhf.
  * debian/jvm.cfg-client_default: aarch32 only builds the client
    compiler and requires its own default jvm. Closes: #874434.

applied/ubuntu/yakkety-updates 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/y...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: ad0cc7aab9acc3b11267e892882e780e128519f8
Unapplied parent: 5af208965f0f69d4e56a602a1f613e71ed1a2722

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

ubuntu/yakkety-devel 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 40f6d6145db57c7c56492b0ffef8e56ef9633f5f

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

ubuntu/yakkety-security 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 40f6d6145db57c7c56492b0ffef8e56ef9633f5f

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

ubuntu/yakkety-updates 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 40f6d6145db57c7c56492b0ffef8e56ef9633f5f

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

applied/ubuntu/yakkety-devel 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/y...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: ad0cc7aab9acc3b11267e892882e780e128519f8
Unapplied parent: 5af208965f0f69d4e56a602a1f613e71ed1a2722

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

applied/ubuntu/yakkety-security 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/y...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: ad0cc7aab9acc3b11267e892882e780e128519f8
Unapplied parent: 5af208965f0f69d4e56a602a1f613e71ed1a2722

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

ubuntu/zesty 2017-03-03 22:16:11 UTC 2017-03-03
Import patches-unapplied version 8u121-b13-4 to debian/sid

Author: Matthias Klose
Author Date: 2017-03-03 17:46:54 UTC

Import patches-unapplied version 8u121-b13-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6f469ba514aa6107b18c3541c9a3079648664d48

New changelog entries:
  * Drop Recommends on obsolete GNOME libraries so they are not in a
    default GNOME desktop installation (Simon McVittie). Closes: #850268.
    - sun.net.spi.DefaultProxySelector prefers libglib2.0-0 (>= 2.24)
      over obsolete libgconf2-4.
    - sun.nio.fs.GnomeFileTypeDetector prefers libglib2.0-0 (>= 2.24)
      over libgnomevfs-2-0.
    - sun.xawt.awt_Desktop prefers libgtk2.0-0 (>= 2.14) over
      libgnomevfs2-0.
  * See the bug report for an analysis why this can be done for releases
    back to Debian wheezy (7.0) and Ubuntu precise (12.04 LTS).

ubuntu/zesty-proposed 2017-03-03 22:16:11 UTC 2017-03-03
Import patches-unapplied version 8u121-b13-4 to debian/sid

Author: Matthias Klose
Author Date: 2017-03-03 17:46:54 UTC

Import patches-unapplied version 8u121-b13-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6f469ba514aa6107b18c3541c9a3079648664d48

New changelog entries:
  * Drop Recommends on obsolete GNOME libraries so they are not in a
    default GNOME desktop installation (Simon McVittie). Closes: #850268.
    - sun.net.spi.DefaultProxySelector prefers libglib2.0-0 (>= 2.24)
      over obsolete libgconf2-4.
    - sun.nio.fs.GnomeFileTypeDetector prefers libglib2.0-0 (>= 2.24)
      over libgnomevfs-2-0.
    - sun.xawt.awt_Desktop prefers libgtk2.0-0 (>= 2.14) over
      libgnomevfs2-0.
  * See the bug report for an analysis why this can be done for releases
    back to Debian wheezy (7.0) and Ubuntu precise (12.04 LTS).

applied/ubuntu/zesty-proposed 2017-03-03 22:16:11 UTC 2017-03-03
Import patches-applied version 8u121-b13-4 to applied/debian/sid

Author: Matthias Klose
Author Date: 2017-03-03 17:46:54 UTC

Import patches-applied version 8u121-b13-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 472bd90e7e55a31e8c9c0b5a241d370cf115e7ff
Unapplied parent: 6f7e116a37b8db59573a3ba1ce89b1be38e40a13

New changelog entries:
  * Drop Recommends on obsolete GNOME libraries so they are not in a
    default GNOME desktop installation (Simon McVittie). Closes: #850268.
    - sun.net.spi.DefaultProxySelector prefers libglib2.0-0 (>= 2.24)
      over obsolete libgconf2-4.
    - sun.nio.fs.GnomeFileTypeDetector prefers libglib2.0-0 (>= 2.24)
      over libgnomevfs-2-0.
    - sun.xawt.awt_Desktop prefers libgtk2.0-0 (>= 2.14) over
      libgnomevfs2-0.
  * See the bug report for an analysis why this can be done for releases
    back to Debian wheezy (7.0) and Ubuntu precise (12.04 LTS).

applied/ubuntu/zesty 2017-03-03 22:16:11 UTC 2017-03-03
Import patches-applied version 8u121-b13-4 to applied/debian/sid

Author: Matthias Klose
Author Date: 2017-03-03 17:46:54 UTC

Import patches-applied version 8u121-b13-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 472bd90e7e55a31e8c9c0b5a241d370cf115e7ff
Unapplied parent: 6f7e116a37b8db59573a3ba1ce89b1be38e40a13

New changelog entries:
  * Drop Recommends on obsolete GNOME libraries so they are not in a
    default GNOME desktop installation (Simon McVittie). Closes: #850268.
    - sun.net.spi.DefaultProxySelector prefers libglib2.0-0 (>= 2.24)
      over obsolete libgconf2-4.
    - sun.nio.fs.GnomeFileTypeDetector prefers libglib2.0-0 (>= 2.24)
      over libgnomevfs-2-0.
    - sun.xawt.awt_Desktop prefers libgtk2.0-0 (>= 2.14) over
      libgnomevfs2-0.
  * See the bug report for an analysis why this can be done for releases
    back to Debian wheezy (7.0) and Ubuntu precise (12.04 LTS).

ubuntu/yakkety 2016-08-08 04:25:25 UTC 2016-08-08
Import patches-unapplied version 8u102-b14.1-2 to debian/sid

Author: Matthias Klose
Author Date: 2016-08-06 08:12:09 UTC

Import patches-unapplied version 8u102-b14.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: be7b319147d84c25796770ba72b81c798c97f361

New changelog entries:
  * Fix build failure with GCC 6. Closes: #811694.
  * Fix JamVM, lacking JVM_GetResourceLookupCacheURLs (Xerxes Rånby).
    Closes: #826206.
  * Explicitly build using GCC 6.

ubuntu/yakkety-proposed 2016-08-08 04:25:25 UTC 2016-08-08
Import patches-unapplied version 8u102-b14.1-2 to debian/sid

Author: Matthias Klose
Author Date: 2016-08-06 08:12:09 UTC

Import patches-unapplied version 8u102-b14.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: be7b319147d84c25796770ba72b81c798c97f361

New changelog entries:
  * Fix build failure with GCC 6. Closes: #811694.
  * Fix JamVM, lacking JVM_GetResourceLookupCacheURLs (Xerxes Rånby).
    Closes: #826206.
  * Explicitly build using GCC 6.

applied/ubuntu/yakkety-proposed 2016-08-08 04:25:25 UTC 2016-08-08
Import patches-applied version 8u102-b14.1-2 to applied/debian/sid

Author: Matthias Klose
Author Date: 2016-08-06 08:12:09 UTC

Import patches-applied version 8u102-b14.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: e1600279a2d93aa1b931ccaba2203d5830d5993d
Unapplied parent: 8856e4fe289dadaf77425de102af5110ed218b6c

New changelog entries:
  * Fix build failure with GCC 6. Closes: #811694.
  * Fix JamVM, lacking JVM_GetResourceLookupCacheURLs (Xerxes Rånby).
    Closes: #826206.
  * Explicitly build using GCC 6.

applied/ubuntu/yakkety 2016-08-08 04:25:25 UTC 2016-08-08
Import patches-applied version 8u102-b14.1-2 to applied/debian/sid

Author: Matthias Klose
Author Date: 2016-08-06 08:12:09 UTC

Import patches-applied version 8u102-b14.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: e1600279a2d93aa1b931ccaba2203d5830d5993d
Unapplied parent: 8856e4fe289dadaf77425de102af5110ed218b6c

New changelog entries:
  * Fix build failure with GCC 6. Closes: #811694.
  * Fix JamVM, lacking JVM_GetResourceLookupCacheURLs (Xerxes Rånby).
    Closes: #826206.
  * Explicitly build using GCC 6.

ubuntu/wily-security 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-sec...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63a85a926cd74dbfa1757fe41fbdd8cb3ac8e931

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

applied/ubuntu/wily-security 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wi...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: c23000ec1044153fdffc639d5c4b2c0cfc0b5c04
Unapplied parent: 7c1b6b24c112252a2613e26e79c9d9b6f616771a

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

applied/ubuntu/wily-updates 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wi...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: c23000ec1044153fdffc639d5c4b2c0cfc0b5c04
Unapplied parent: 7c1b6b24c112252a2613e26e79c9d9b6f616771a

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

applied/ubuntu/wily-devel 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wi...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: c23000ec1044153fdffc639d5c4b2c0cfc0b5c04
Unapplied parent: 7c1b6b24c112252a2613e26e79c9d9b6f616771a

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

ubuntu/wily-devel 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-sec...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63a85a926cd74dbfa1757fe41fbdd8cb3ac8e931

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

ubuntu/wily-updates 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-sec...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63a85a926cd74dbfa1757fe41fbdd8cb3ac8e931

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

ubuntu/xenial 2016-04-13 19:05:05 UTC 2016-04-13
Import patches-unapplied version 8u77-b03-3ubuntu3 to ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-04-13 17:17:37 UTC

Import patches-unapplied version 8u77-b03-3ubuntu3 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 5b4a0264a3b533af677d677476190859161e7d2e

New changelog entries:
  * Build-depend on jtreg again, run the tests during the build.

applied/ubuntu/xenial-proposed 2016-04-13 19:05:05 UTC 2016-04-13
Import patches-applied version 8u77-b03-3ubuntu3 to applied/ubuntu/xenial-pro...

Author: Matthias Klose
Author Date: 2016-04-13 17:17:37 UTC

Import patches-applied version 8u77-b03-3ubuntu3 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 2e01295013d39a991e99656d53b44e03a6f542a6
Unapplied parent: 904b2ac29a55b2d2d9295f5a3ad777be3df9a397

New changelog entries:
  * Build-depend on jtreg again, run the tests during the build.

applied/ubuntu/xenial 2016-04-13 19:05:05 UTC 2016-04-13
Import patches-applied version 8u77-b03-3ubuntu3 to applied/ubuntu/xenial-pro...

Author: Matthias Klose
Author Date: 2016-04-13 17:17:37 UTC

Import patches-applied version 8u77-b03-3ubuntu3 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 2e01295013d39a991e99656d53b44e03a6f542a6
Unapplied parent: 904b2ac29a55b2d2d9295f5a3ad777be3df9a397

New changelog entries:
  * Build-depend on jtreg again, run the tests during the build.

ubuntu/xenial-proposed 2016-04-13 19:05:05 UTC 2016-04-13
Import patches-unapplied version 8u77-b03-3ubuntu3 to ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-04-13 17:17:37 UTC

Import patches-unapplied version 8u77-b03-3ubuntu3 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 5b4a0264a3b533af677d677476190859161e7d2e

New changelog entries:
  * Build-depend on jtreg again, run the tests during the build.

1100 of 116 results

Other repositories

Name Last Modified
lp:ubuntu/+source/openjdk-8 17 hours ago
lp:~tdaitx/ubuntu/+source/openjdk-8 2019-09-11
12 of 2 results
You can't create new repositories for openjdk-8 in Ubuntu.