View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/openjdk-8
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/debian/dsc 2019-07-18 23:07:33 UTC 2019-07-18
DSC file for 8u222-b10-1

Author: Ubuntu Git Importer
Author Date: 2019-07-18 23:07:33 UTC

DSC file for 8u222-b10-1

importer/ubuntu/dsc 2019-07-18 20:13:28 UTC 2019-07-18
DSC file for 8u222-b10-1ubuntu2

Author: Ubuntu Git Importer
Author Date: 2019-07-18 20:13:28 UTC

DSC file for 8u222-b10-1ubuntu2

ubuntu/eoan-devel 2019-07-18 20:08:14 UTC 2019-07-18
Import patches-unapplied version 8u222-b10-1ubuntu2 to ubuntu/eoan-proposed

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:49:56 UTC

Import patches-unapplied version 8u222-b10-1ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: ddaafcd879f8476a138abc6f5da03c4454192a64

New changelog entries:
  * Improve and fix build tests and autopkgtests:
    - Update debian/tests/hotspot,jdk,langtools to ignore
      jtreg-autopkgtest.sh return code.
    - Create debian/tests/jtdiff-autopkgtest.in as it depends
      on debian/rules variables.
    - debian/tests/jtreg-autopkgtest.sh:
      + Enable retry of failed tests to trim out flaky tests.
      + Fix unbound variable.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Keep .jtr files from failed tests only.
    - debian/tests/jtdiff-autopkgtest.sh:
      + Fail only if an actual regression is detected.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Add the super-diff comparison from jtdiff.
    - debian/rules:
      + Preserve all JTreport directories in the test output
        directory.
      + Use JDK_DIR instead of JDK_TO_TEST for autopkgtest
        generation.
      + Package all .jtr files from JTwork as jtreg-autopkgtest.sh
        makes sure it contains only failing tests.

applied/ubuntu/devel 2019-07-18 20:08:14 UTC 2019-07-18
Import patches-applied version 8u222-b10-1ubuntu2 to applied/ubuntu/eoan-prop...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:49:56 UTC

Import patches-applied version 8u222-b10-1ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 914bcf4eb7b8219c13d3cb3473c81ed509d9c3be
Unapplied parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Improve and fix build tests and autopkgtests:
    - Update debian/tests/hotspot,jdk,langtools to ignore
      jtreg-autopkgtest.sh return code.
    - Create debian/tests/jtdiff-autopkgtest.in as it depends
      on debian/rules variables.
    - debian/tests/jtreg-autopkgtest.sh:
      + Enable retry of failed tests to trim out flaky tests.
      + Fix unbound variable.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Keep .jtr files from failed tests only.
    - debian/tests/jtdiff-autopkgtest.sh:
      + Fail only if an actual regression is detected.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Add the super-diff comparison from jtdiff.
    - debian/rules:
      + Preserve all JTreport directories in the test output
        directory.
      + Use JDK_DIR instead of JDK_TO_TEST for autopkgtest
        generation.
      + Package all .jtr files from JTwork as jtreg-autopkgtest.sh
        makes sure it contains only failing tests.

ubuntu/devel 2019-07-18 20:08:14 UTC 2019-07-18
Import patches-unapplied version 8u222-b10-1ubuntu2 to ubuntu/eoan-proposed

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:49:56 UTC

Import patches-unapplied version 8u222-b10-1ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: ddaafcd879f8476a138abc6f5da03c4454192a64

New changelog entries:
  * Improve and fix build tests and autopkgtests:
    - Update debian/tests/hotspot,jdk,langtools to ignore
      jtreg-autopkgtest.sh return code.
    - Create debian/tests/jtdiff-autopkgtest.in as it depends
      on debian/rules variables.
    - debian/tests/jtreg-autopkgtest.sh:
      + Enable retry of failed tests to trim out flaky tests.
      + Fix unbound variable.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Keep .jtr files from failed tests only.
    - debian/tests/jtdiff-autopkgtest.sh:
      + Fail only if an actual regression is detected.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Add the super-diff comparison from jtdiff.
    - debian/rules:
      + Preserve all JTreport directories in the test output
        directory.
      + Use JDK_DIR instead of JDK_TO_TEST for autopkgtest
        generation.
      + Package all .jtr files from JTwork as jtreg-autopkgtest.sh
        makes sure it contains only failing tests.

ubuntu/eoan-proposed 2019-07-18 20:08:14 UTC 2019-07-18
Import patches-unapplied version 8u222-b10-1ubuntu2 to ubuntu/eoan-proposed

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:49:56 UTC

Import patches-unapplied version 8u222-b10-1ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: ddaafcd879f8476a138abc6f5da03c4454192a64

New changelog entries:
  * Improve and fix build tests and autopkgtests:
    - Update debian/tests/hotspot,jdk,langtools to ignore
      jtreg-autopkgtest.sh return code.
    - Create debian/tests/jtdiff-autopkgtest.in as it depends
      on debian/rules variables.
    - debian/tests/jtreg-autopkgtest.sh:
      + Enable retry of failed tests to trim out flaky tests.
      + Fix unbound variable.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Keep .jtr files from failed tests only.
    - debian/tests/jtdiff-autopkgtest.sh:
      + Fail only if an actual regression is detected.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Add the super-diff comparison from jtdiff.
    - debian/rules:
      + Preserve all JTreport directories in the test output
        directory.
      + Use JDK_DIR instead of JDK_TO_TEST for autopkgtest
        generation.
      + Package all .jtr files from JTwork as jtreg-autopkgtest.sh
        makes sure it contains only failing tests.

applied/ubuntu/eoan-devel 2019-07-18 20:08:14 UTC 2019-07-18
Import patches-applied version 8u222-b10-1ubuntu2 to applied/ubuntu/eoan-prop...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:49:56 UTC

Import patches-applied version 8u222-b10-1ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 914bcf4eb7b8219c13d3cb3473c81ed509d9c3be
Unapplied parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Improve and fix build tests and autopkgtests:
    - Update debian/tests/hotspot,jdk,langtools to ignore
      jtreg-autopkgtest.sh return code.
    - Create debian/tests/jtdiff-autopkgtest.in as it depends
      on debian/rules variables.
    - debian/tests/jtreg-autopkgtest.sh:
      + Enable retry of failed tests to trim out flaky tests.
      + Fix unbound variable.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Keep .jtr files from failed tests only.
    - debian/tests/jtdiff-autopkgtest.sh:
      + Fail only if an actual regression is detected.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Add the super-diff comparison from jtdiff.
    - debian/rules:
      + Preserve all JTreport directories in the test output
        directory.
      + Use JDK_DIR instead of JDK_TO_TEST for autopkgtest
        generation.
      + Package all .jtr files from JTwork as jtreg-autopkgtest.sh
        makes sure it contains only failing tests.

applied/ubuntu/eoan-proposed 2019-07-18 20:08:14 UTC 2019-07-18
Import patches-applied version 8u222-b10-1ubuntu2 to applied/ubuntu/eoan-prop...

Author: Tiago Stürmer Daitx
Author Date: 2019-07-18 18:49:56 UTC

Import patches-applied version 8u222-b10-1ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 914bcf4eb7b8219c13d3cb3473c81ed509d9c3be
Unapplied parent: 6259b1f4e88544f61e4060b17d441989ca5b1676

New changelog entries:
  * Improve and fix build tests and autopkgtests:
    - Update debian/tests/hotspot,jdk,langtools to ignore
      jtreg-autopkgtest.sh return code.
    - Create debian/tests/jtdiff-autopkgtest.in as it depends
      on debian/rules variables.
    - debian/tests/jtreg-autopkgtest.sh:
      + Enable retry of failed tests to trim out flaky tests.
      + Fix unbound variable.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Keep .jtr files from failed tests only.
    - debian/tests/jtdiff-autopkgtest.sh:
      + Fail only if an actual regression is detected.
      + Force JT_JAVA otherwise jtreg will look for
        /usr/lib/jvm/default-java which might not be installed
        or be the right JVM to use.
      + Add the super-diff comparison from jtdiff.
    - debian/rules:
      + Preserve all JTreport directories in the test output
        directory.
      + Use JDK_DIR instead of JDK_TO_TEST for autopkgtest
        generation.
      + Package all .jtr files from JTwork as jtreg-autopkgtest.sh
        makes sure it contains only failing tests.

debian/sid 2019-07-18 17:40:33 UTC 2019-07-18
Import patches-unapplied version 8u222-b10-1 to ubuntu/eoan-proposed

Author: Matthias Klose
Author Date: 2019-07-18 16:57:23 UTC

Import patches-unapplied version 8u222-b10-1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 946e59bdbbbc878877c902807ce4c86788af3c2c

New changelog entries:
  * Update to 8u222-b10 (except for AArch32, updated to b08).
    - Security fixes:
      - S8191073: JpegImageReader throws IndexOutOfBoundsException when
        trying to read image data from tables-only image.
      - S8208698, CVE-2019-2745: Improved ECC Implementation.
      - S8212328, CVE-2019-2762: Exceptional throw cases.
      - S8213431, CVE-2019-2766: Improve file protocol handling.
      - S8213432, CVE-2019-2769: Better copies of CopiesList.
      - S8216381, CVE-2019-2786: More limited privilege usage.
      - S8217563: Improve realm maintenance.
      - S8218863: Better endpoint checks.
      - S8218873: Improve JSSE endpoint checking.
      - S8218876, CVE-2019-7317: Improve PNG support options.
      - S8219018: Adjust positions of glyphs.
      - S8219020: Table alternate substitutions.
      - S8219775: Certificate validation improvements.
      - S8220192: Better outlook for SecureRandom.
      - S8220517: Enhanced GIF support.
      - S8221518, CVE-2019-2816: Normalize normalization.
      - S8223511, CVE-2019-2842: Extended AES support.
  [ Matthias Klose ]
  * Bump standards version.
  [ Tiago Stürmer Daitx ]
  * Backport fix for S8223511 for AArch32.

applied/debian/sid 2019-07-18 17:40:33 UTC 2019-07-18
Import patches-applied version 8u222-b10-1 to applied/ubuntu/eoan-proposed

Author: Matthias Klose
Author Date: 2019-07-18 16:57:23 UTC

Import patches-applied version 8u222-b10-1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: e4cbca9b64e9306aece9cb7df08ff6f2652ac9cf
Unapplied parent: ddaafcd879f8476a138abc6f5da03c4454192a64

New changelog entries:
  * Update to 8u222-b10 (except for AArch32, updated to b08).
    - Security fixes:
      - S8191073: JpegImageReader throws IndexOutOfBoundsException when
        trying to read image data from tables-only image.
      - S8208698, CVE-2019-2745: Improved ECC Implementation.
      - S8212328, CVE-2019-2762: Exceptional throw cases.
      - S8213431, CVE-2019-2766: Improve file protocol handling.
      - S8213432, CVE-2019-2769: Better copies of CopiesList.
      - S8216381, CVE-2019-2786: More limited privilege usage.
      - S8217563: Improve realm maintenance.
      - S8218863: Better endpoint checks.
      - S8218873: Improve JSSE endpoint checking.
      - S8218876, CVE-2019-7317: Improve PNG support options.
      - S8219018: Adjust positions of glyphs.
      - S8219020: Table alternate substitutions.
      - S8219775: Certificate validation improvements.
      - S8220192: Better outlook for SecureRandom.
      - S8220517: Enhanced GIF support.
      - S8221518, CVE-2019-2816: Normalize normalization.
      - S8223511, CVE-2019-2842: Extended AES support.
  [ Matthias Klose ]
  * Bump standards version.
  [ Tiago Stürmer Daitx ]
  * Backport fix for S8223511 for AArch32.

ubuntu/eoan 2019-07-09 06:07:56 UTC 2019-07-09
Import patches-unapplied version 8u222-b07-3 to debian/sid

Author: Matthias Klose
Author Date: 2019-07-07 20:02:56 UTC

Import patches-unapplied version 8u222-b07-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 5f1d1a5e1491cb71b97e465ff194bb8fb37cccc5

New changelog entries:
  * Upload to unstable.

applied/ubuntu/eoan 2019-07-09 06:07:56 UTC 2019-07-09
Import patches-applied version 8u222-b07-3 to applied/debian/sid

Author: Matthias Klose
Author Date: 2019-07-07 20:02:56 UTC

Import patches-applied version 8u222-b07-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 36c6f2f5cdaa0e9a114fc799f7cfde1a2f85b004
Unapplied parent: 946e59bdbbbc878877c902807ce4c86788af3c2c

New changelog entries:
  * Upload to unstable.

applied/debian/experimental 2019-06-29 16:27:13 UTC 2019-06-29
Import patches-applied version 8u222-b07-2 to applied/debian/experimental

Author: Matthias Klose
Author Date: 2019-06-29 09:17:16 UTC

Import patches-applied version 8u222-b07-2 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 914cf2f9ac32ae0cca134e89c6e736f321dfcf64
Unapplied parent: 5f1d1a5e1491cb71b97e465ff194bb8fb37cccc5

New changelog entries:
  * Remove AArch32 patches, applied upstream.
  * Fix build dependencies for Ubuntu precise builds.

debian/experimental 2019-06-29 16:27:13 UTC 2019-06-29
Import patches-unapplied version 8u222-b07-2 to debian/experimental

Author: Matthias Klose
Author Date: 2019-06-29 09:17:16 UTC

Import patches-unapplied version 8u222-b07-2 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: b4e347754fdcf8ac3319f1da30804873a01fc8d5

New changelog entries:
  * Remove AArch32 patches, applied upstream.
  * Fix build dependencies for Ubuntu precise builds.

ubuntu/disco-security 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.19.04.2 to ubuntu/disco-s...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.19.04.2 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/xenial-devel 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.16.04.1 to applied/ubuntu/x...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.16.04.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 0a8a121cd1e94f06228102a431823548d0b69039

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

ubuntu/xenial-updates 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.16.04.1 to ubuntu/xenial-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.16.04.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

ubuntu/xenial-security 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.16.04.1 to ubuntu/xenial-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.16.04.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

ubuntu/xenial-devel 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.16.04.1 to ubuntu/xenial-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.16.04.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

applied/ubuntu/bionic-devel 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.18.04.1 to applied/ubuntu/b...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.18.04.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: b10db4d6343d21b3448214ba8e0af4ed62c4e849

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

ubuntu/disco-updates 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.19.04.2 to ubuntu/disco-s...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.19.04.2 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/bionic-security 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.18.04.1 to applied/ubuntu/b...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.18.04.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: b10db4d6343d21b3448214ba8e0af4ed62c4e849

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

applied/ubuntu/bionic-updates 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.18.04.1 to applied/ubuntu/b...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.18.04.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: b10db4d6343d21b3448214ba8e0af4ed62c4e849

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

applied/ubuntu/cosmic-devel 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/c...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 93fa43287a9b2c89f78b45809f1e7f1dc3b4c9e7

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/cosmic-security 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/c...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 93fa43287a9b2c89f78b45809f1e7f1dc3b4c9e7

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/cosmic-updates 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/c...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.18.10.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 93fa43287a9b2c89f78b45809f1e7f1dc3b4c9e7

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/disco-devel 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.19.04.2 to applied/ubuntu/d...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.19.04.2 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 4cc785d6464750a8eb6fbd7e3b680e8c6cc8f11c

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/disco-security 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.19.04.2 to applied/ubuntu/d...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.19.04.2 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 4cc785d6464750a8eb6fbd7e3b680e8c6cc8f11c

New changelog entries:
  * Backport from Eoan.

applied/ubuntu/disco-updates 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.19.04.2 to applied/ubuntu/d...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.19.04.2 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 4cc785d6464750a8eb6fbd7e3b680e8c6cc8f11c

New changelog entries:
  * Backport from Eoan.

ubuntu/cosmic-updates 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.

ubuntu/cosmic-security 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.

ubuntu/cosmic-devel 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.18.10.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.

ubuntu/bionic-updates 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.18.04.1 to ubuntu/bionic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.18.04.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

ubuntu/bionic-security 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.18.04.1 to ubuntu/bionic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.18.04.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

ubuntu/bionic-devel 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.18.04.1 to ubuntu/bionic-...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.18.04.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

applied/ubuntu/xenial-security 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.16.04.1 to applied/ubuntu/x...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.16.04.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 0a8a121cd1e94f06228102a431823548d0b69039

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

applied/ubuntu/xenial-updates 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-applied version 8u212-b03-0ubuntu1.16.04.1 to applied/ubuntu/x...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-applied version 8u212-b03-0ubuntu1.16.04.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 66e77bd945929363a4d5df0801d55df53db5fdd2
Unapplied parent: 0a8a121cd1e94f06228102a431823548d0b69039

New changelog entries:
  * Backport from Eoan.
  * debian/control: regenerated.

ubuntu/disco-devel 2019-05-13 18:38:14 UTC 2019-05-13
Import patches-unapplied version 8u212-b03-0ubuntu1.19.04.2 to ubuntu/disco-s...

Author: Tiago Stürmer Daitx
Author Date: 2019-04-26 01:04:36 UTC

Import patches-unapplied version 8u212-b03-0ubuntu1.19.04.2 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: fdaea9751f339a0846b2dc8bc53de66966ed2ce6

New changelog entries:
  * Backport from Eoan.

debian/stretch 2019-04-27 11:00:44 UTC 2019-04-27
Import patches-unapplied version 8u212-b01-1~deb9u1 to debian/stretch

Author: Moritz Muehlenhoff
Author Date: 2019-03-18 23:06:47 UTC

Import patches-unapplied version 8u212-b01-1~deb9u1 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: bcf669cb3877011e0e8303d9ba80d03a73be2953

New changelog entries:
  * Rebuild for stretch

applied/debian/stretch 2019-04-27 11:00:44 UTC 2019-04-27
Import patches-applied version 8u212-b01-1~deb9u1 to applied/debian/stretch

Author: Moritz Muehlenhoff
Author Date: 2019-03-18 23:06:47 UTC

Import patches-applied version 8u212-b01-1~deb9u1 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: c6907f8e763b1e36a42cce6520cd09508db0f21a
Unapplied parent: 7cb7c7b5021b3fc453301e9505a92a5c90feb110

New changelog entries:
  * Rebuild for stretch

applied/ubuntu/disco-proposed 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: be6fc80943901fa33a2ad0f01ad57483867b776f
Unapplied parent: bcf669cb3877011e0e8303d9ba80d03a73be2953

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

ubuntu/disco-proposed 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: a8e02d5e9741cdd693e777c6d0a464d49d9c2f3d

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

applied/ubuntu/disco 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: be6fc80943901fa33a2ad0f01ad57483867b776f
Unapplied parent: bcf669cb3877011e0e8303d9ba80d03a73be2953

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

applied/debian/buster 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-applied version 8u212-b01-1 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: be6fc80943901fa33a2ad0f01ad57483867b776f
Unapplied parent: bcf669cb3877011e0e8303d9ba80d03a73be2953

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

debian/buster 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: a8e02d5e9741cdd693e777c6d0a464d49d9c2f3d

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

ubuntu/disco 2019-03-19 07:53:11 UTC 2019-03-19
Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Author: Matthias Klose
Author Date: 2019-03-19 07:26:02 UTC

Import patches-unapplied version 8u212-b01-1 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: a8e02d5e9741cdd693e777c6d0a464d49d9c2f3d

New changelog entries:
  * Update to 8u212-b01.
  * Enable SA on AArch64.

applied/ubuntu/cosmic 2018-08-04 16:35:05 UTC 2018-08-04
Import patches-applied version 8u181-b13-1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2018-08-04 12:10:33 UTC

Import patches-applied version 8u181-b13-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: b0f3bf2d900b3df07a1281976987a590ed9d167e
Unapplied parent: d3d42527193fe7d5d54340f54d7ac6c1934d613d

New changelog entries:
  * Update to 8u181-b13.
  * Remove the mauve test machinery.
  * Build using GCC 8 in development releases.

applied/ubuntu/cosmic-proposed 2018-08-04 16:35:05 UTC 2018-08-04
Import patches-applied version 8u181-b13-1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2018-08-04 12:10:33 UTC

Import patches-applied version 8u181-b13-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: b0f3bf2d900b3df07a1281976987a590ed9d167e
Unapplied parent: d3d42527193fe7d5d54340f54d7ac6c1934d613d

New changelog entries:
  * Update to 8u181-b13.
  * Remove the mauve test machinery.
  * Build using GCC 8 in development releases.

ubuntu/cosmic 2018-08-04 16:35:05 UTC 2018-08-04
Import patches-unapplied version 8u181-b13-1 to debian/sid

Author: Matthias Klose
Author Date: 2018-08-04 12:10:33 UTC

Import patches-unapplied version 8u181-b13-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 1b8390461083c78e179e8ca6f1d728f028b73553

New changelog entries:
  * Update to 8u181-b13.
  * Remove the mauve test machinery.
  * Build using GCC 8 in development releases.

ubuntu/cosmic-proposed 2018-08-04 16:35:05 UTC 2018-08-04
Import patches-unapplied version 8u181-b13-1 to debian/sid

Author: Matthias Klose
Author Date: 2018-08-04 12:10:33 UTC

Import patches-unapplied version 8u181-b13-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 1b8390461083c78e179e8ca6f1d728f028b73553

New changelog entries:
  * Update to 8u181-b13.
  * Remove the mauve test machinery.
  * Build using GCC 8 in development releases.

applied/ubuntu/artful-security 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/a...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: db5b4ba3f4a04ed0b377bedee58d68811218872e
Unapplied parent: 1f4e1dccd38021f42609b43a7a617cb57bf51afe

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

applied/ubuntu/artful-updates 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/a...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: db5b4ba3f4a04ed0b377bedee58d68811218872e
Unapplied parent: 1f4e1dccd38021f42609b43a7a617cb57bf51afe

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

ubuntu/artful-devel 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: a306516cd67c0a4ae8aff73e3395d2a792b31712

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

ubuntu/artful-security 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: a306516cd67c0a4ae8aff73e3395d2a792b31712

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

ubuntu/artful-updates 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-unapplied version 8u171-b11-0ubuntu0.17.10.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: a306516cd67c0a4ae8aff73e3395d2a792b31712

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

applied/ubuntu/artful-devel 2018-05-11 01:39:34 UTC 2018-05-11
Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/a...

Author: Tiago Stürmer Daitx
Author Date: 2018-04-26 15:59:34 UTC

Import patches-applied version 8u171-b11-0ubuntu0.17.10.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: db5b4ba3f4a04ed0b377bedee58d68811218872e
Unapplied parent: 1f4e1dccd38021f42609b43a7a617cb57bf51afe

New changelog entries:
  * Update to 8u171-b11. Hotspot 8u162-b12 for aarch32 with 8u171-b10 hotspot
    security fixes and 8u171-b10 for aarch64.
    - CVE-2018-2790,S8189969: Manifest better manifest entries.
    - CVE-2018-2795,S8189977: Improve permission portability.
    - CVE-2018-2796,S8189981: Improve queuing portability.
    - CVE-2018-2797,S8189985: Improve tabular data portability.
    - CVE-2018-2798,S8189989: Improve container portability.
    - CVE-2018-2799,S8189993: Improve document portability.
    - CVE-2018-2794,S8189997: Enhance keystore mechanisms.
    - CVE-2018-2814,S8192025: Less referential references.
    - CVE-2018-2815,S8192757: Improve stub classes implementation.
    - CVE-2018-2800,S8193833: Better RMI connection support.
    - S8169080: Improve documentation examples for crypto applications.
    - S8180881: Better packaging of deserialization.
    - S8182362: Update CipherOutputStream Usage.
    - S8189123: More consistent classloading.
    - S8190478: Improved interface method selection.
    - S8190877: Better handling of abstract classes.
    - S8191696: Better mouse positioning.
    - S8192030: Better MTSchema support.
    - S8193409: Improve AES supporting classes.
    - S8193414: Improvements in MethodType lookups.
  * d/p/aarch64-hotspot-8u162-b12.patch: removed, tarball has been updated to
    8u171-b10.
  * d/p/hotspot-S8185723-zero-ppc32-atomic_copy64-fix.patch,
    d/p/hotspot-S8201509-zero-s390x-atomic_copy64-fix.patch: fix ppc32, s390x
    javac segmentation fault caused by wrong inline assembler.

importer/ubuntu/pristine-tar 2018-04-03 04:14:06 UTC 2018-04-03
pristine-tar data for openjdk-8_8u162-b12.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-03 04:14:06 UTC

pristine-tar data for openjdk-8_8u162-b12.orig.tar.xz

importer/debian/pristine-tar 2018-04-03 02:20:21 UTC 2018-04-03
pristine-tar data for openjdk-8_8u162-b12.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-03 02:20:21 UTC

pristine-tar data for openjdk-8_8u162-b12.orig.tar.xz

ubuntu/bionic-proposed 2018-03-15 22:34:53 UTC 2018-03-15
Import patches-unapplied version 8u162-b12-1 to debian/sid

Author: Matthias Klose
Author Date: 2018-03-15 17:19:50 UTC

Import patches-unapplied version 8u162-b12-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 577790c5bb412190f538d72474cd1707d0b81f09

New changelog entries:
  [ Tiago Stürmer Daitx ]
  * Update to 8u162-b12. Hotspot 8u162-b12 for aarch32 and 8u161-b16
    for aarch64 (wth 8u162-b12 patches).
  * Security updates:
    - CVE-2018-2633,S8186606: Improve LDAP lookup robustness.
    - CVE-2018-2637,S8186998: Improve JMX supportive features.
    - CVE-2018-2634,S8186600: Improve property negotiations.
    - CVE-2018-2582,S8174962: Better interface invocations.
    - CVE-2018-2641,S8185325: Improve GTK initialization.
    - CVE-2018-2618,S8185292: Stricter key generation.
    - CVE-2018-2629,S8186212: Improve GSS handling.
    - CVE-2018-2603,S8182387: Improve PKCS usage.
    - CVE-2018-2599,S8182125: Improve reliability of DNS lookups.
    - CVE-2018-2602,S8182601: Improve usage messages.
    - CVE-2018-2588,S8178449: Improve LDAP logins.
    - CVE-2018-2678,S8191142: More refactoring for naming deserialization
      cases.
    - CVE-2018-2677,S8190289: More refactoring for client deserialization
      cases.
    - CVE-2018-2663,S8189284: More refactoring for deserialization cases.
    - CVE-2018-2579,S8172525: Improve key keying case.
  * d/p/aarch64-hotspot-8u162-b12.patch: update aarch64 hotspot to 8u162-b12.
  * d/p/icedtea-4953367.patch: removed, fixed upstream by "S8136570: Stop
    changing user environment variables related to /usr/dt".
  * d/p/gcc6.diff: removed, fixed upstream.
  * d/p/jdk-getAccessibleValue.diff: updated, removed chunks fixed upstream
    by "S8076249: NPE in AccessBridge while editing JList model" and
    "S8145207: [macosx] JList, VO can't access non-visible list items".
  * d/p/openjdk-ppc64el-S8170153.patch, d/p/8164293.diff,
    d/p/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch,
    d/p/hotspot-ppc64el-S8168318-cmpldi.patch,
    d/p/hotspot-ppc64el-S8170328-andis.patch,
    d/p/hotspot-ppc64el-S8175813-mbind-invalid-argument.patch,
    d/p/hotspot-ppc64el-S8181055-use-numa-v2-api.patch,
    d/p/hotspot-ppc64el-S8181810-leverage-extrdi.patch: removed,
    applied upstream.
  * d/rules, d/control: depend on GKT3 instead of GTK2 for newer releases.
    LP: #1735482.
  * d/rules: wait 10 seconds before issuing SIGKILL to buildwatch.
  * d/buildwatch.sh: find hs_err files and cat them to help debugging build
    failures.
  * S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter.
    LP: #8173853.
  [ Matthias Klose ]
  * Disable Hotspot workaround for Exec Shield (Debian only).
    Closes: #876051.
  * Fix some lintian warnings.

applied/ubuntu/bionic 2018-03-15 22:34:53 UTC 2018-03-15
Import patches-applied version 8u162-b12-1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2018-03-15 17:19:50 UTC

Import patches-applied version 8u162-b12-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 7de299365c82d4cd9a0aa351c91144f9c84e7869
Unapplied parent: a306516cd67c0a4ae8aff73e3395d2a792b31712

New changelog entries:
  [ Tiago Stürmer Daitx ]
  * Update to 8u162-b12. Hotspot 8u162-b12 for aarch32 and 8u161-b16
    for aarch64 (wth 8u162-b12 patches).
  * Security updates:
    - CVE-2018-2633,S8186606: Improve LDAP lookup robustness.
    - CVE-2018-2637,S8186998: Improve JMX supportive features.
    - CVE-2018-2634,S8186600: Improve property negotiations.
    - CVE-2018-2582,S8174962: Better interface invocations.
    - CVE-2018-2641,S8185325: Improve GTK initialization.
    - CVE-2018-2618,S8185292: Stricter key generation.
    - CVE-2018-2629,S8186212: Improve GSS handling.
    - CVE-2018-2603,S8182387: Improve PKCS usage.
    - CVE-2018-2599,S8182125: Improve reliability of DNS lookups.
    - CVE-2018-2602,S8182601: Improve usage messages.
    - CVE-2018-2588,S8178449: Improve LDAP logins.
    - CVE-2018-2678,S8191142: More refactoring for naming deserialization
      cases.
    - CVE-2018-2677,S8190289: More refactoring for client deserialization
      cases.
    - CVE-2018-2663,S8189284: More refactoring for deserialization cases.
    - CVE-2018-2579,S8172525: Improve key keying case.
  * d/p/aarch64-hotspot-8u162-b12.patch: update aarch64 hotspot to 8u162-b12.
  * d/p/icedtea-4953367.patch: removed, fixed upstream by "S8136570: Stop
    changing user environment variables related to /usr/dt".
  * d/p/gcc6.diff: removed, fixed upstream.
  * d/p/jdk-getAccessibleValue.diff: updated, removed chunks fixed upstream
    by "S8076249: NPE in AccessBridge while editing JList model" and
    "S8145207: [macosx] JList, VO can't access non-visible list items".
  * d/p/openjdk-ppc64el-S8170153.patch, d/p/8164293.diff,
    d/p/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch,
    d/p/hotspot-ppc64el-S8168318-cmpldi.patch,
    d/p/hotspot-ppc64el-S8170328-andis.patch,
    d/p/hotspot-ppc64el-S8175813-mbind-invalid-argument.patch,
    d/p/hotspot-ppc64el-S8181055-use-numa-v2-api.patch,
    d/p/hotspot-ppc64el-S8181810-leverage-extrdi.patch: removed,
    applied upstream.
  * d/rules, d/control: depend on GKT3 instead of GTK2 for newer releases.
    LP: #1735482.
  * d/rules: wait 10 seconds before issuing SIGKILL to buildwatch.
  * d/buildwatch.sh: find hs_err files and cat them to help debugging build
    failures.
  * S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter.
    LP: #8173853.
  [ Matthias Klose ]
  * Disable Hotspot workaround for Exec Shield (Debian only).
    Closes: #876051.
  * Fix some lintian warnings.

ubuntu/bionic 2018-03-15 22:34:53 UTC 2018-03-15
Import patches-unapplied version 8u162-b12-1 to debian/sid

Author: Matthias Klose
Author Date: 2018-03-15 17:19:50 UTC

Import patches-unapplied version 8u162-b12-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 577790c5bb412190f538d72474cd1707d0b81f09

New changelog entries:
  [ Tiago Stürmer Daitx ]
  * Update to 8u162-b12. Hotspot 8u162-b12 for aarch32 and 8u161-b16
    for aarch64 (wth 8u162-b12 patches).
  * Security updates:
    - CVE-2018-2633,S8186606: Improve LDAP lookup robustness.
    - CVE-2018-2637,S8186998: Improve JMX supportive features.
    - CVE-2018-2634,S8186600: Improve property negotiations.
    - CVE-2018-2582,S8174962: Better interface invocations.
    - CVE-2018-2641,S8185325: Improve GTK initialization.
    - CVE-2018-2618,S8185292: Stricter key generation.
    - CVE-2018-2629,S8186212: Improve GSS handling.
    - CVE-2018-2603,S8182387: Improve PKCS usage.
    - CVE-2018-2599,S8182125: Improve reliability of DNS lookups.
    - CVE-2018-2602,S8182601: Improve usage messages.
    - CVE-2018-2588,S8178449: Improve LDAP logins.
    - CVE-2018-2678,S8191142: More refactoring for naming deserialization
      cases.
    - CVE-2018-2677,S8190289: More refactoring for client deserialization
      cases.
    - CVE-2018-2663,S8189284: More refactoring for deserialization cases.
    - CVE-2018-2579,S8172525: Improve key keying case.
  * d/p/aarch64-hotspot-8u162-b12.patch: update aarch64 hotspot to 8u162-b12.
  * d/p/icedtea-4953367.patch: removed, fixed upstream by "S8136570: Stop
    changing user environment variables related to /usr/dt".
  * d/p/gcc6.diff: removed, fixed upstream.
  * d/p/jdk-getAccessibleValue.diff: updated, removed chunks fixed upstream
    by "S8076249: NPE in AccessBridge while editing JList model" and
    "S8145207: [macosx] JList, VO can't access non-visible list items".
  * d/p/openjdk-ppc64el-S8170153.patch, d/p/8164293.diff,
    d/p/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch,
    d/p/hotspot-ppc64el-S8168318-cmpldi.patch,
    d/p/hotspot-ppc64el-S8170328-andis.patch,
    d/p/hotspot-ppc64el-S8175813-mbind-invalid-argument.patch,
    d/p/hotspot-ppc64el-S8181055-use-numa-v2-api.patch,
    d/p/hotspot-ppc64el-S8181810-leverage-extrdi.patch: removed,
    applied upstream.
  * d/rules, d/control: depend on GKT3 instead of GTK2 for newer releases.
    LP: #1735482.
  * d/rules: wait 10 seconds before issuing SIGKILL to buildwatch.
  * d/buildwatch.sh: find hs_err files and cat them to help debugging build
    failures.
  * S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter.
    LP: #8173853.
  [ Matthias Klose ]
  * Disable Hotspot workaround for Exec Shield (Debian only).
    Closes: #876051.
  * Fix some lintian warnings.

applied/ubuntu/bionic-proposed 2018-03-15 22:34:53 UTC 2018-03-15
Import patches-applied version 8u162-b12-1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2018-03-15 17:19:50 UTC

Import patches-applied version 8u162-b12-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 7de299365c82d4cd9a0aa351c91144f9c84e7869
Unapplied parent: a306516cd67c0a4ae8aff73e3395d2a792b31712

New changelog entries:
  [ Tiago Stürmer Daitx ]
  * Update to 8u162-b12. Hotspot 8u162-b12 for aarch32 and 8u161-b16
    for aarch64 (wth 8u162-b12 patches).
  * Security updates:
    - CVE-2018-2633,S8186606: Improve LDAP lookup robustness.
    - CVE-2018-2637,S8186998: Improve JMX supportive features.
    - CVE-2018-2634,S8186600: Improve property negotiations.
    - CVE-2018-2582,S8174962: Better interface invocations.
    - CVE-2018-2641,S8185325: Improve GTK initialization.
    - CVE-2018-2618,S8185292: Stricter key generation.
    - CVE-2018-2629,S8186212: Improve GSS handling.
    - CVE-2018-2603,S8182387: Improve PKCS usage.
    - CVE-2018-2599,S8182125: Improve reliability of DNS lookups.
    - CVE-2018-2602,S8182601: Improve usage messages.
    - CVE-2018-2588,S8178449: Improve LDAP logins.
    - CVE-2018-2678,S8191142: More refactoring for naming deserialization
      cases.
    - CVE-2018-2677,S8190289: More refactoring for client deserialization
      cases.
    - CVE-2018-2663,S8189284: More refactoring for deserialization cases.
    - CVE-2018-2579,S8172525: Improve key keying case.
  * d/p/aarch64-hotspot-8u162-b12.patch: update aarch64 hotspot to 8u162-b12.
  * d/p/icedtea-4953367.patch: removed, fixed upstream by "S8136570: Stop
    changing user environment variables related to /usr/dt".
  * d/p/gcc6.diff: removed, fixed upstream.
  * d/p/jdk-getAccessibleValue.diff: updated, removed chunks fixed upstream
    by "S8076249: NPE in AccessBridge while editing JList model" and
    "S8145207: [macosx] JList, VO can't access non-visible list items".
  * d/p/openjdk-ppc64el-S8170153.patch, d/p/8164293.diff,
    d/p/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch,
    d/p/hotspot-ppc64el-S8168318-cmpldi.patch,
    d/p/hotspot-ppc64el-S8170328-andis.patch,
    d/p/hotspot-ppc64el-S8175813-mbind-invalid-argument.patch,
    d/p/hotspot-ppc64el-S8181055-use-numa-v2-api.patch,
    d/p/hotspot-ppc64el-S8181810-leverage-extrdi.patch: removed,
    applied upstream.
  * d/rules, d/control: depend on GKT3 instead of GTK2 for newer releases.
    LP: #1735482.
  * d/rules: wait 10 seconds before issuing SIGKILL to buildwatch.
  * d/buildwatch.sh: find hs_err files and cat them to help debugging build
    failures.
  * S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter.
    LP: #8173853.
  [ Matthias Klose ]
  * Disable Hotspot workaround for Exec Shield (Debian only).
    Closes: #876051.
  * Fix some lintian warnings.

ubuntu/zesty-security 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-s...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: ffd97cb5086477058b5181c1c126e0fc4a9f765e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

applied/ubuntu/zesty-updates 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/z...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 9d42834938b8664510175b690e4a2390bf3a3b31
Unapplied parent: ca107c44190d8cc93b67a451cdfda6ed10023c8e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

ubuntu/zesty-updates 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-s...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: ffd97cb5086477058b5181c1c126e0fc4a9f765e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

applied/ubuntu/zesty-security 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/z...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 9d42834938b8664510175b690e4a2390bf3a3b31
Unapplied parent: ca107c44190d8cc93b67a451cdfda6ed10023c8e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

ubuntu/zesty-devel 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-s...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-unapplied version 8u151-b12-0ubuntu0.17.04.2 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: ffd97cb5086477058b5181c1c126e0fc4a9f765e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

applied/ubuntu/zesty-devel 2017-11-08 08:15:17 UTC 2017-11-08
Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/z...

Author: Tiago Stürmer Daitx
Author Date: 2017-10-26 19:48:24 UTC

Import patches-applied version 8u151-b12-0ubuntu0.17.04.2 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 9d42834938b8664510175b690e4a2390bf3a3b31
Unapplied parent: ca107c44190d8cc93b67a451cdfda6ed10023c8e

New changelog entries:
  * Backport to 17.04.
  * Update to 8u151-b12. Hotspot 8u144-b01 for aarch32 with 8u151 hotspot
    patches.
  * Security patches:
    - CVE-2017-10274, S8169026: Handle smartcard clean up better. If a
      CardImpl can be recovered via finalization, then separate instances
      pointing to the same device can be created.
    - CVE-2017-10281, S8174109: Better queuing priorities. PriorityQueue's
      readObject allocates an array based on data in the stream which could
      cause an OOM.
    - CVE-2017-10285, S8174966: Unreferenced references. RMI's Unreferenced
      thread can be used as the root of a Trusted Method Chain.
    - CVE-2017-10295, S8176751: Better URL connections. On Ubuntu (and
      possibly other Linux flavors) CR-NL in the host field are ignored and
      can be used to inject headers in an HTTP request stream.
    - CVE-2017-10388, S8178794: Correct Kerberos ticket grants. Kerberos
      implementations can incorrectly take information from the unencrypted
      portion of the ticket from the KDC. This can lead to an MITM attack
      impersonating Kerberos services.
    - CVE-2017-10346, S8180711: Better alignment of special invocations. A
      missing load constraint for some invokespecial cases can allow invoking
      a method from an unrelated class.
    - CVE-2017-10350, S8181100: Better Base Exceptions. An array is allocated
      based on data in the serial stream without a limit onthe size.
    - CVE-2017-10347, S8181323: Better timezone processing. An array is
      allocated based on data in the serial stream without a limit on the
      size.
    - CVE-2017-10349, S8181327: Better Node predications. An array is
      allocated based on data in the serial stream without a limit onthe size.
    - CVE-2017-10345, S8181370: Better keystore handling. A malicious
      serialized object in a keystore can cause a DoS when using keytool.
    - CVE-2017-10348, S8181432: Better processing of unresolved permissions.
      An array is allocated based on data in the serial stream without a limit
      onthe size.
    - CVE-2017-10357, S8181597: Process Proxy presentation. A malicious
      serialized stream could cause an OOM due to lack on checking on the
      number of interfaces read from the stream for a Proxy.
    - CVE-2017-10355, S8181612: More stable connection processing. If an
      attack can cause an application to open a connection to a malicious FTP
      server (e.g., via XML), then a thread can be tied up indefinitely in
      accept(2).
    - CVE-2017-10356, S8181692: Update storage implementations. JKS and JCEKS
      keystores should be retired from common use in favor of more modern
      keystore protections.
    - CVE-2016-10165, S8183028: Improve CMS header processing. Missing bounds
      check could lead to leaked memory contents.
    - CVE-2016-9841, S8184682: Upgrade compression library. There were four
      off by one errors found in the zlib library. Two of them are long typed
      which could lead to RCE.
  * debian/rules:
    - own /usr/share/man/man1 since we use it in the postinst script.
      Closes: #863199.
    - openjdk8 now ships limited and unlimited policy.jar files (S8157561)
      into their own directories under jre/lib/security/policy, thus we
      must to copy those directories instead of the policy.jar files.
  * debian/rules, debian/patches/sec-webrev-8u151-hotspot-8179084.patch,
    debian/patches/sec-webrev-8u151-hotspot-8180711.patch: apply
    hotspot security updates to both aarch32 and aarch64.
  * debian/patches/gcc6.diff, debian/patches/aarch64.diff,
    debian/patches/aarch32.diff, debian/patches/m68k-support.diff,
    debian/patches/system-libjpeg.diff: removed hunks related to
    the common/autoconf/generated-configure.sh file as we regenerate
    it, no need to keep maintaining those.
  * debian/patches/hotspot-ppc64el-S8168318-cmpldi.patch: use cmpldi instead
    of li/cmpld. LP: #1723893.
  * debian/patches/hotspot-ppc64el-S8170328-andis.patch: use andis instead of
    lis/and. LP: #1723862.
  * debian/patches/hotspot-ppc64el-S8145913-montgomery-multiply-intrinsic.patch:
    add Montgomery multiply intrinsic. LP: #1723860.
  * debian/patches/hotspot-ppc64el-S8181810-leverage-extrdi.patch: leverage
    extrdi for bitfield extract is absent in OpenJDK 8. LP: #1723861.
  * debian/patches/jdk-S8165852-overlayfs.patch: mount point not found for a
    file which is present in overlayfs.

applied/ubuntu/artful 2017-09-30 04:34:08 UTC 2017-09-30
Import patches-applied version 8u144-b01-2 to applied/debian/sid

Author: Matthias Klose
Author Date: 2017-09-30 00:37:14 UTC

Import patches-applied version 8u144-b01-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 7edb06d22e3ace6b17b6d122e62fdb002e6fe737
Unapplied parent: ffd97cb5086477058b5181c1c126e0fc4a9f765e

New changelog entries:
  [ Matthias Klose ]
  * Don't regenerate the control file during the build.
  * Enable systemtap on sh4.
  * Bump standards version to 4.1.0.
  * Build using GCC 7 on recent development versions.
  [ Tiago Stürmer Daitx ]
  * debian/rules:
    - when zero/shark alternate vm is build, add '-zero KNOWN' to jvm.cfg.
    - for non-hotspot builds add '-zero ALIASED_TO -server' to jvm.cfg.
    - enable zero alternate vm on armhf.
  * debian/jvm.cfg-client_default: aarch32 only builds the client
    compiler and requires its own default jvm. Closes: #874434.

ubuntu/artful 2017-09-30 04:34:08 UTC 2017-09-30
Import patches-unapplied version 8u144-b01-2 to debian/sid

Author: Matthias Klose
Author Date: 2017-09-30 00:37:14 UTC

Import patches-unapplied version 8u144-b01-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: af976799a7dc5d59fa8fce5cd3c6fa4c178c45ac

New changelog entries:
  [ Matthias Klose ]
  * Don't regenerate the control file during the build.
  * Enable systemtap on sh4.
  * Bump standards version to 4.1.0.
  * Build using GCC 7 on recent development versions.
  [ Tiago Stürmer Daitx ]
  * debian/rules:
    - when zero/shark alternate vm is build, add '-zero KNOWN' to jvm.cfg.
    - for non-hotspot builds add '-zero ALIASED_TO -server' to jvm.cfg.
    - enable zero alternate vm on armhf.
  * debian/jvm.cfg-client_default: aarch32 only builds the client
    compiler and requires its own default jvm. Closes: #874434.

applied/ubuntu/artful-proposed 2017-09-30 04:34:08 UTC 2017-09-30
Import patches-applied version 8u144-b01-2 to applied/debian/sid

Author: Matthias Klose
Author Date: 2017-09-30 00:37:14 UTC

Import patches-applied version 8u144-b01-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 7edb06d22e3ace6b17b6d122e62fdb002e6fe737
Unapplied parent: ffd97cb5086477058b5181c1c126e0fc4a9f765e

New changelog entries:
  [ Matthias Klose ]
  * Don't regenerate the control file during the build.
  * Enable systemtap on sh4.
  * Bump standards version to 4.1.0.
  * Build using GCC 7 on recent development versions.
  [ Tiago Stürmer Daitx ]
  * debian/rules:
    - when zero/shark alternate vm is build, add '-zero KNOWN' to jvm.cfg.
    - for non-hotspot builds add '-zero ALIASED_TO -server' to jvm.cfg.
    - enable zero alternate vm on armhf.
  * debian/jvm.cfg-client_default: aarch32 only builds the client
    compiler and requires its own default jvm. Closes: #874434.

ubuntu/artful-proposed 2017-09-30 04:34:08 UTC 2017-09-30
Import patches-unapplied version 8u144-b01-2 to debian/sid

Author: Matthias Klose
Author Date: 2017-09-30 00:37:14 UTC

Import patches-unapplied version 8u144-b01-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: af976799a7dc5d59fa8fce5cd3c6fa4c178c45ac

New changelog entries:
  [ Matthias Klose ]
  * Don't regenerate the control file during the build.
  * Enable systemtap on sh4.
  * Bump standards version to 4.1.0.
  * Build using GCC 7 on recent development versions.
  [ Tiago Stürmer Daitx ]
  * debian/rules:
    - when zero/shark alternate vm is build, add '-zero KNOWN' to jvm.cfg.
    - for non-hotspot builds add '-zero ALIASED_TO -server' to jvm.cfg.
    - enable zero alternate vm on armhf.
  * debian/jvm.cfg-client_default: aarch32 only builds the client
    compiler and requires its own default jvm. Closes: #874434.

applied/ubuntu/yakkety-devel 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/y...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: ad0cc7aab9acc3b11267e892882e780e128519f8
Unapplied parent: 5af208965f0f69d4e56a602a1f613e71ed1a2722

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

applied/ubuntu/yakkety-updates 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/y...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: ad0cc7aab9acc3b11267e892882e780e128519f8
Unapplied parent: 5af208965f0f69d4e56a602a1f613e71ed1a2722

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

ubuntu/yakkety-updates 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 40f6d6145db57c7c56492b0ffef8e56ef9633f5f

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

ubuntu/yakkety-security 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 40f6d6145db57c7c56492b0ffef8e56ef9633f5f

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

ubuntu/yakkety-devel 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-unapplied version 8u131-b11-0ubuntu1.16.10.2 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 40f6d6145db57c7c56492b0ffef8e56ef9633f5f

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

applied/ubuntu/yakkety-security 2017-05-11 14:43:19 UTC 2017-05-11
Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/y...

Author: Tiago Stürmer Daitx
Author Date: 2017-05-04 21:08:56 UTC

Import patches-applied version 8u131-b11-0ubuntu1.16.10.2 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: ad0cc7aab9acc3b11267e892882e780e128519f8
Unapplied parent: 5af208965f0f69d4e56a602a1f613e71ed1a2722

New changelog entries:
  * Re-enable jamvm.
  * Backport to 16.10.

applied/ubuntu/zesty-proposed 2017-03-03 22:16:11 UTC 2017-03-03
Import patches-applied version 8u121-b13-4 to applied/debian/sid

Author: Matthias Klose
Author Date: 2017-03-03 17:46:54 UTC

Import patches-applied version 8u121-b13-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 472bd90e7e55a31e8c9c0b5a241d370cf115e7ff
Unapplied parent: 6f7e116a37b8db59573a3ba1ce89b1be38e40a13

New changelog entries:
  * Drop Recommends on obsolete GNOME libraries so they are not in a
    default GNOME desktop installation (Simon McVittie). Closes: #850268.
    - sun.net.spi.DefaultProxySelector prefers libglib2.0-0 (>= 2.24)
      over obsolete libgconf2-4.
    - sun.nio.fs.GnomeFileTypeDetector prefers libglib2.0-0 (>= 2.24)
      over libgnomevfs-2-0.
    - sun.xawt.awt_Desktop prefers libgtk2.0-0 (>= 2.14) over
      libgnomevfs2-0.
  * See the bug report for an analysis why this can be done for releases
    back to Debian wheezy (7.0) and Ubuntu precise (12.04 LTS).

applied/ubuntu/zesty 2017-03-03 22:16:11 UTC 2017-03-03
Import patches-applied version 8u121-b13-4 to applied/debian/sid

Author: Matthias Klose
Author Date: 2017-03-03 17:46:54 UTC

Import patches-applied version 8u121-b13-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 472bd90e7e55a31e8c9c0b5a241d370cf115e7ff
Unapplied parent: 6f7e116a37b8db59573a3ba1ce89b1be38e40a13

New changelog entries:
  * Drop Recommends on obsolete GNOME libraries so they are not in a
    default GNOME desktop installation (Simon McVittie). Closes: #850268.
    - sun.net.spi.DefaultProxySelector prefers libglib2.0-0 (>= 2.24)
      over obsolete libgconf2-4.
    - sun.nio.fs.GnomeFileTypeDetector prefers libglib2.0-0 (>= 2.24)
      over libgnomevfs-2-0.
    - sun.xawt.awt_Desktop prefers libgtk2.0-0 (>= 2.14) over
      libgnomevfs2-0.
  * See the bug report for an analysis why this can be done for releases
    back to Debian wheezy (7.0) and Ubuntu precise (12.04 LTS).

ubuntu/zesty 2017-03-03 22:16:11 UTC 2017-03-03
Import patches-unapplied version 8u121-b13-4 to debian/sid

Author: Matthias Klose
Author Date: 2017-03-03 17:46:54 UTC

Import patches-unapplied version 8u121-b13-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6f469ba514aa6107b18c3541c9a3079648664d48

New changelog entries:
  * Drop Recommends on obsolete GNOME libraries so they are not in a
    default GNOME desktop installation (Simon McVittie). Closes: #850268.
    - sun.net.spi.DefaultProxySelector prefers libglib2.0-0 (>= 2.24)
      over obsolete libgconf2-4.
    - sun.nio.fs.GnomeFileTypeDetector prefers libglib2.0-0 (>= 2.24)
      over libgnomevfs-2-0.
    - sun.xawt.awt_Desktop prefers libgtk2.0-0 (>= 2.14) over
      libgnomevfs2-0.
  * See the bug report for an analysis why this can be done for releases
    back to Debian wheezy (7.0) and Ubuntu precise (12.04 LTS).

ubuntu/zesty-proposed 2017-03-03 22:16:11 UTC 2017-03-03
Import patches-unapplied version 8u121-b13-4 to debian/sid

Author: Matthias Klose
Author Date: 2017-03-03 17:46:54 UTC

Import patches-unapplied version 8u121-b13-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6f469ba514aa6107b18c3541c9a3079648664d48

New changelog entries:
  * Drop Recommends on obsolete GNOME libraries so they are not in a
    default GNOME desktop installation (Simon McVittie). Closes: #850268.
    - sun.net.spi.DefaultProxySelector prefers libglib2.0-0 (>= 2.24)
      over obsolete libgconf2-4.
    - sun.nio.fs.GnomeFileTypeDetector prefers libglib2.0-0 (>= 2.24)
      over libgnomevfs-2-0.
    - sun.xawt.awt_Desktop prefers libgtk2.0-0 (>= 2.14) over
      libgnomevfs2-0.
  * See the bug report for an analysis why this can be done for releases
    back to Debian wheezy (7.0) and Ubuntu precise (12.04 LTS).

ubuntu/yakkety-proposed 2016-08-08 04:25:25 UTC 2016-08-08
Import patches-unapplied version 8u102-b14.1-2 to debian/sid

Author: Matthias Klose
Author Date: 2016-08-06 08:12:09 UTC

Import patches-unapplied version 8u102-b14.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: be7b319147d84c25796770ba72b81c798c97f361

New changelog entries:
  * Fix build failure with GCC 6. Closes: #811694.
  * Fix JamVM, lacking JVM_GetResourceLookupCacheURLs (Xerxes Rånby).
    Closes: #826206.
  * Explicitly build using GCC 6.

applied/ubuntu/yakkety-proposed 2016-08-08 04:25:25 UTC 2016-08-08
Import patches-applied version 8u102-b14.1-2 to applied/debian/sid

Author: Matthias Klose
Author Date: 2016-08-06 08:12:09 UTC

Import patches-applied version 8u102-b14.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: e1600279a2d93aa1b931ccaba2203d5830d5993d
Unapplied parent: 8856e4fe289dadaf77425de102af5110ed218b6c

New changelog entries:
  * Fix build failure with GCC 6. Closes: #811694.
  * Fix JamVM, lacking JVM_GetResourceLookupCacheURLs (Xerxes Rånby).
    Closes: #826206.
  * Explicitly build using GCC 6.

applied/ubuntu/yakkety 2016-08-08 04:25:25 UTC 2016-08-08
Import patches-applied version 8u102-b14.1-2 to applied/debian/sid

Author: Matthias Klose
Author Date: 2016-08-06 08:12:09 UTC

Import patches-applied version 8u102-b14.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: e1600279a2d93aa1b931ccaba2203d5830d5993d
Unapplied parent: 8856e4fe289dadaf77425de102af5110ed218b6c

New changelog entries:
  * Fix build failure with GCC 6. Closes: #811694.
  * Fix JamVM, lacking JVM_GetResourceLookupCacheURLs (Xerxes Rånby).
    Closes: #826206.
  * Explicitly build using GCC 6.

ubuntu/yakkety 2016-08-08 04:25:25 UTC 2016-08-08
Import patches-unapplied version 8u102-b14.1-2 to debian/sid

Author: Matthias Klose
Author Date: 2016-08-06 08:12:09 UTC

Import patches-unapplied version 8u102-b14.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: be7b319147d84c25796770ba72b81c798c97f361

New changelog entries:
  * Fix build failure with GCC 6. Closes: #811694.
  * Fix JamVM, lacking JVM_GetResourceLookupCacheURLs (Xerxes Rånby).
    Closes: #826206.
  * Explicitly build using GCC 6.

applied/ubuntu/wily-devel 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wi...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: c23000ec1044153fdffc639d5c4b2c0cfc0b5c04
Unapplied parent: 7c1b6b24c112252a2613e26e79c9d9b6f616771a

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

applied/ubuntu/wily-security 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wi...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: c23000ec1044153fdffc639d5c4b2c0cfc0b5c04
Unapplied parent: 7c1b6b24c112252a2613e26e79c9d9b6f616771a

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

applied/ubuntu/wily-updates 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wi...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-applied version 8u91-b14-3ubuntu1~15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: c23000ec1044153fdffc639d5c4b2c0cfc0b5c04
Unapplied parent: 7c1b6b24c112252a2613e26e79c9d9b6f616771a

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

ubuntu/wily-devel 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-sec...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63a85a926cd74dbfa1757fe41fbdd8cb3ac8e931

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

ubuntu/wily-security 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-sec...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63a85a926cd74dbfa1757fe41fbdd8cb3ac8e931

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

ubuntu/wily-updates 2016-07-27 06:49:08 UTC 2016-07-27
Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-sec...

Author: Tiago Stürmer Daitx
Author Date: 2016-07-16 15:54:36 UTC

Import patches-unapplied version 8u91-b14-3ubuntu1~15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63a85a926cd74dbfa1757fe41fbdd8cb3ac8e931

New changelog entries:
  * Backport to Ubuntu 15.10.
  * SECURITY UPDATE: IIOP Input Stream Hooking
    - d/p/corba-8079718.patch: S8079718, CVE-2016-3458: defaultReadObject is
      not forbidden in readObject in subclasses of InputStreamHook which
      provides leverage to deserialize malicious objects if a reference to the
      input stream can be obtained separately.
  * SECURITY UPDATE: Complete name checking
    - d/p/jaxp-8148872.patch: S8148872, CVE-2016-3500: In some cases raw names
      in XML data are not checked for length limits allowing for DoS attacks.
  * SECURITY UPDATE: Better delineation of XML processing
    - d/p/jaxp-8149962.patch: S8149962, CVE-2016-3508: Denial of service
      measures do not take newline characters into account. This can be used to
      conduct attacks like the billion laughs DoS.
  * SECURITY UPDATE: Coded byte streams
    - d/p/hotspot-8152479.patch: S8152479, CVE-2016-3550: A fuzzed class file
      triggers an integer overflow in array access.
  * SECURITY UPDATE: Clean up lookup visibility
    - d/p/jdk-8154475.patch: S8154475, CVE-2016-3587: A fast path change
      allowed access to MH.invokeBasic via the public lookup object. MH.iB does
      not do full type checking which can be used to create type confusion.
  * SECURITY UPDATE: Bolster bytecode verification
    - d/p/hotspot-8155981.patch: S8155981, CVE-2016-3606: The bytecode
      verifier checks that any classes' <init> method calls super.<init> before
      returning. There is a way to bypass this requirement which allows
      creating subclasses of classes that are not intended to be extended.
  * SECURITY UPDATE: Persistent Parameter Processing
    - d/p/jdk-8155985.patch: S8155985, CVE-2016-3598: TOCTOU issue with types
      List passed into dropArguments() which can be used to cause type
      confusion.
  * SECURITY UPDATE: Additional method handle validation
    - d/p/jdk-8158571.patch: S8158571, CVE-2016-3610: MHs.filterReturnValue
      does not check the filter parameter list size. The single expected
      parameter is put in the last parameter position for the filter MH
      allowing for type confusion.
  * SECURITY UPDATE: Enforce GCM limits
    - d/p/jdk-8146514.patch: S8146514: In GCM the counter should not be allowed
      to wrap (per the spec), since that plus exposing the encrypted data could
      lead to leaking information.
  * SECURITY UPDATE: Construction of static protection domains
    - d/p/jdk-8147771.patch: S8147771: SubjectDomainCombiner does not honor the
      staticPermission field and will create ProtectionDomains that vary with
      the system policy which may allow unexpected permission sets.
  * SECURITY UPDATE: Share Class Data
    - d/p/hotspot-8150752.patch: S8150752: Additional verification of AppCDS
      archives is required to prevent an attacker from creating a type
      confusion situation.
  * SECURITY UPDATE: Enforce update ordering
    - d/p/jdk-8149070.patch: S8149070: If the GCM methods update() and
      updateAAD() are used out of order, the security of the system can be
      weakened and an exception should be thrown to warn the developer.
  * SECURITY UPDATE: Constrain AppCDS behavior
    - d/p/hotspot-8153312.patch: S8153312: AppCDS does not create classloader
      constraints upon reloading classes which could allow class spoofing under
      some circumstances.

applied/ubuntu/xenial 2016-04-13 19:05:05 UTC 2016-04-13
Import patches-applied version 8u77-b03-3ubuntu3 to applied/ubuntu/xenial-pro...

Author: Matthias Klose
Author Date: 2016-04-13 17:17:37 UTC

Import patches-applied version 8u77-b03-3ubuntu3 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 2e01295013d39a991e99656d53b44e03a6f542a6
Unapplied parent: 904b2ac29a55b2d2d9295f5a3ad777be3df9a397

New changelog entries:
  * Build-depend on jtreg again, run the tests during the build.

ubuntu/xenial 2016-04-13 19:05:05 UTC 2016-04-13
Import patches-unapplied version 8u77-b03-3ubuntu3 to ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-04-13 17:17:37 UTC

Import patches-unapplied version 8u77-b03-3ubuntu3 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 5b4a0264a3b533af677d677476190859161e7d2e

New changelog entries:
  * Build-depend on jtreg again, run the tests during the build.

ubuntu/xenial-proposed 2016-04-13 19:05:05 UTC 2016-04-13
Import patches-unapplied version 8u77-b03-3ubuntu3 to ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-04-13 17:17:37 UTC

Import patches-unapplied version 8u77-b03-3ubuntu3 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 5b4a0264a3b533af677d677476190859161e7d2e

New changelog entries:
  * Build-depend on jtreg again, run the tests during the build.

applied/ubuntu/xenial-proposed 2016-04-13 19:05:05 UTC 2016-04-13
Import patches-applied version 8u77-b03-3ubuntu3 to applied/ubuntu/xenial-pro...

Author: Matthias Klose
Author Date: 2016-04-13 17:17:37 UTC

Import patches-applied version 8u77-b03-3ubuntu3 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 2e01295013d39a991e99656d53b44e03a6f542a6
Unapplied parent: 904b2ac29a55b2d2d9295f5a3ad777be3df9a397

New changelog entries:
  * Build-depend on jtreg again, run the tests during the build.

ubuntu/wily 2015-10-08 16:16:21 UTC 2015-10-08
Import patches-unapplied version 8u66-b01-5 to debian/sid

Author: Matthias Klose
Author Date: 2015-10-08 06:03:51 UTC

Import patches-unapplied version 8u66-b01-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 94b6507cb80d960c7cf40ad6cf5be3ae5b16b964

New changelog entries:
  * Backport the proposed patch for 8036767, renaming the architecture
    on ppc64el from ppc64 to ppc64le.
  * JDK-8073139: PPC64: User-visible arch directory and os.arch value on
    ppc64le cause issues with Java tooling (Tiago Stürmer Daitx).

ubuntu/wily-proposed 2015-10-08 16:16:21 UTC 2015-10-08
Import patches-unapplied version 8u66-b01-5 to debian/sid

Author: Matthias Klose
Author Date: 2015-10-08 06:03:51 UTC

Import patches-unapplied version 8u66-b01-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 94b6507cb80d960c7cf40ad6cf5be3ae5b16b964

New changelog entries:
  * Backport the proposed patch for 8036767, renaming the architecture
    on ppc64el from ppc64 to ppc64le.
  * JDK-8073139: PPC64: User-visible arch directory and os.arch value on
    ppc64le cause issues with Java tooling (Tiago Stürmer Daitx).

applied/ubuntu/wily 2015-10-08 16:16:21 UTC 2015-10-08
Import patches-applied version 8u66-b01-5 to applied/debian/sid

Author: Matthias Klose
Author Date: 2015-10-08 06:03:51 UTC

Import patches-applied version 8u66-b01-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 633a6b0fb50214d9b0dff810c17f92ec551dc75d
Unapplied parent: 5404e4b8a23878d4d7e264b2ba2501fc91ac8864

New changelog entries:
  * Backport the proposed patch for 8036767, renaming the architecture
    on ppc64el from ppc64 to ppc64le.
  * JDK-8073139: PPC64: User-visible arch directory and os.arch value on
    ppc64le cause issues with Java tooling (Tiago Stürmer Daitx).

applied/ubuntu/wily-proposed 2015-10-08 16:16:21 UTC 2015-10-08
Import patches-applied version 8u66-b01-5 to applied/debian/sid

Author: Matthias Klose
Author Date: 2015-10-08 06:03:51 UTC

Import patches-applied version 8u66-b01-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 633a6b0fb50214d9b0dff810c17f92ec551dc75d
Unapplied parent: 5404e4b8a23878d4d7e264b2ba2501fc91ac8864

New changelog entries:
  * Backport the proposed patch for 8036767, renaming the architecture
    on ppc64el from ppc64 to ppc64le.
  * JDK-8073139: PPC64: User-visible arch directory and os.arch value on
    ppc64le cause issues with Java tooling (Tiago Stürmer Daitx).

1100 of 112 results

Other repositories

Name Last Modified
lp:ubuntu/+source/openjdk-8 2019-07-18
11 of 1 result
You can't create new repositories for openjdk-8 in Ubuntu.