| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
S8048030, CVE-2015-4734: Expectations should be consistent
S8068842, CVE-2015-4803: Better JAXP data handling
S8076339, CVE-2015-4903: Better handling of remote object invocation
S8076383, CVE-2015-4835: Better CORBA exception handling
S8076387, CVE-2015-4882: Better CORBA value handling
S8076392. CVE-2015-4881: Improve IIOPInputStream consistency
S8076413, CVE-2015-4883: Better JRMP message handling
S8078427, CVE-2015-4842: More supportive home environment
S8078440: Safer managed types
S8080541: More direct property handling
S8080688, CVE-2015-4860: Service for DGC services
S8081760: Better group dynamics
S8086092, CVE-2015-4840: More palette improvements
S8086733, CVE-2015-4893: Improve namespace handling
S8087350: Improve array conversions
S8103671, CVE-2015-4805: More objective stream classes
S8103675: Better Binary searches
S8130078, CVE-2015-4911: Document better processing
S8130193, CVE-2015-4806: Improve HTTP connections
S8130864: Better server identity handling
S8130891, CVE-2015-4843: (bf) More direct buffering
S8131291, CVE-2015-4872: Perfect parameter patterning
S8132042, CVE-2015-4844: Preserve layout presentation
|
|
|
|
|
| |
This conforms to wiki documentation regarding package creation:
http://wiki.alpinelinux.org/wiki/Creating_an_Alpine_package#license
|
| |
|
|
|
|
|
|
| |
this seems to be the only blocker preventing arm build, and there's
no simple fix for this. openjdk has thousands of lines of arm asm
and it's all non-pic. allow textrels for arm for the time being.
|
|
|
|
| |
shell expansion rhino/rhino.{new,old} is used and needs bash
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
S8043202, CVE-2015-2808: Prohibit RC4 cipher suites
S8067694, CVE-2015-2625: Improved certification checking
S8071715, CVE-2015-4760: Tune font layout engine
S8071731: Better scaling for C1
S8072490: Better font morphing redux
S8072887: Better font handling improvements
S8073334: Improved font substitutions
S8073773: Presume path preparedness
S8073894: Getting to the root of certificate chains
S8074330: Set font anchors more solidly
S8074335: Substitute for substitution formats
S8074865, CVE-2015-2601: General crypto resilience changes
S8074871: Adjust device table handling
S8075374, CVE-2015-4748: Responding to OCSP responses
S8075378, CVE-2015-4749: JNDI DnsClient Exception Handling
S8075738: Better multi-JVM sharing
S8075833, CVE-2015-2613: Straighter Elliptic Curves
S8075838: Method for typing MethodTypes
S8075853, CVE-2015-2621: Proxy for MBean proxies
S8076328, CVE-2015-4000: Enforce key exchange constraints
S8076376, CVE-2015-2628: Enhance IIOP operations
S8076397, CVE-2015-4731: Better MBean connections
S8076401, CVE-2015-2590: Serialize OIS data
S8076405, CVE-2015-4732: Improve serial serialization
S8076409, CVE-2015-4733: Reinforce RMI framework
S8077520, CVE-2015-2632: Morph tables into improved form
PR2487, CVE-2015-4000: Make jdk8 mode the default for jdk.tls.ephemeralDHKeySize
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
S8059064: Better G1 log caching
S8060461: Fix for JDK-8042609 uncovers additional issue
S8064601, CVE-2015-0480: Improve jar file handling
S8065286: Fewer subtable substitutions
S8065291: Improved font lookups
S8066479: Better certificate chain validation
S8067050: Better font consistency checking
S8067684: Better font substitutions
S8067699, CVE-2015-0469: Better glyph storage
S8068320, CVE-2015-0477: Limit applet requests
S8068720, CVE-2015-0488: Better certificate options checking
S8069198: Upgrade image library
S8071726, CVE-2015-0478: Better RSA optimizations
S8071818: Better vectorization on SPARC
S8071931, CVE-2015-0460: Return of the phantom menace
|
| |
|
|
|
|
| |
it should be pulled in automatically
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
S8046656: Update protocol support
S8047125, CVE-2015-0395: (ref) More phantom object references
S8047130: Fewer escapes from escape analysis
S8048035, CVE-2015-0400: Ensure proper proxy protocols
S8049253: Better GC validation
S8050807, CVE-2015-0383: Better performing performance data handling
S8054367, CVE-2015-0412: More references for endpoints
S8055304, CVE-2015-0407: More boxing for DirectoryComboBoxModel
S8055309, CVE-2015-0408: RMI needs better transportation considerations
S8055479: TLAB stability
S8055489, CVE-2014-6585: Better substitution formats
S8056264, CVE-2014-6587: Multicast support improvements
S8056276, CVE-2014-6591: Fontmanager feature improvements
S8057555, CVE-2014-6593: Less cryptic cipher suite management
S8058982, CVE-2014-6601: Better verification of an exceptional invokespecial
S8059485, CVE-2015-0410: Resolve parsing ambiguity
S8061210, CVE-2014-3566: Issues in TLS
Along with numerous backports and bug fixes.
|
|
|
|
| |
fails to build so disable for now
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
S8015256: Better class accessibility
S8022783, CVE-2014-6504: Optimize C2 optimizations
S8035162: Service printing service
S8035781: Improve equality for annotations
S8036805: Correct linker method lookup.
S8036810: Correct linker field lookup
S8036936: Use local locales
S8037066, CVE-2014-6457: Secure transport layer
S8037846, CVE-2014-6558: Ensure streaming of input cipher streams
S8038364: Use certificate exceptions correctly
S8038899: Safer safepoints
S8038903: More native monitor monitoring
S8038908: Make Signature more robust
S8038913: Bolster XML support
S8039509, CVE-2014-6512: Wrap sockets more thoroughly
S8039533, CVE-2014-6517: Higher resolution resolvers
S8041540, CVE-2014-6511: Better use of pages in font processing
S8041529: Better parameterization of parameter lists
S8041545: Better validation of generated rasters
S8041564, CVE-2014-6506: Improved management of logger resources
S8041717, CVE-2014-6519: Issue with class file parser
S8042609, CVE-2014-6513: Limit splashiness of splash images
S8042797, CVE-2014-6502: Avoid strawberries in LogRecord
S8044274, CVE-2014-6531: Proper property processing
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
S8029755, CVE-2014-4209: Enhance subject class
S8030763: Validate global memory allocation
S8031340, CVE-2014-4264: Better TLS/EC management
S8031346, CVE-2014-4244: Enhance RSA key handling
S8031540: Introduce document horizon
S8032536: JVM resolves wrong method in some unusual cases
S8033055: Issues in 2d
S8033301, CVE-2014-4266: Build more informative InfoBuilder
S8034267: Probabilistic native crash
S8034272: Do not cram data into CRAM arrays
S8034985, CVE-2014-2483: Better form for Lambda Forms
S8035004, CVE-2014-4252: Provider provides less service
S8035009, CVE-2014-4218: Make Proxy representations consistent
S8035119, CVE-2014-4219: Fix exceptions to bytecode verification
S8035699, CVE-2014-4268: File choosers should be choosier
S8035788. CVE-2014-4221: Provide more consistency for lookups
S8035793, CVE-2014-4223: Maximum arity maxed out
S8036571: (process) Process process arguments carefully
S8036800: Attribute OOM to correct part of code
S8037046: Validate libraries to be loaded
S8037076, CVE-2014-2490: Check constant pool constants
S8037157: Verify <init> call
S8037162, CVE-2014-4263: More robust DH exchanges
S8037167, CVE-2014-4216: Better method signature resolution
S8039520, CVE-2014-4262: More atomicity of atomic updates
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
S8023046: Enhance splashscreen support
S8025005: Enhance CORBA initializations
S8025010, CVE-2014-2412: Enhance AWT contexts
S8025030, CVE-2014-2414: Enhance stream handling
S8025152, CVE-2014-0458: Enhance activation set up
S8026067: Enhance signed jar verification
S8026163, CVE-2014-2427: Enhance media provisioning
S8026188, CVE-2014-2423: Enhance envelope factory
S8026200: Enhance RowSet Factory
S8026716, CVE-2014-2402: (aio) Enhance asynchronous channel handling
S8026736, CVE-2014-2398: Enhance Javadoc pages
S8026797, CVE-2014-0451: Enhance data transfers
S8026801, CVE-2014-0452: Enhance endpoint addressing
S8027766, CVE-2014-0453: Enhance RSA processing
S8027775: Enhance ICU code.
S8027841, CVE-2014-0429: Enhance pixel manipulations
S8028385: Enhance RowSet Factory
S8029282, CVE-2014-2403: Enhance CharInfo set up
S8029286: Enhance subject delegation
S8029699: Update Poller demo
S8029730: Improve audio device additions
S8029735: Enhance service mgmt natives
S8029740, CVE-2014-0446: Enhance handling of loggers
S8029745, CVE-2014-0454: Enhance algorithm checking
S8029750: Enhance LCMS color processing (in-tree LCMS)
S8029760, CVE-2013-6629: Enhance AWT image libraries (in-tree libjpeg)
S8029844, CVE-2014-0455: Enhance argument validation
S8029854, CVE-2014-2421: Enhance JPEG decodings
S8029858, CVE-2014-0456: Enhance array copies
S8030731, CVE-2014-0460: Improve name service robustness
S8031330: Refactor ObjectFactory
S8031335, CVE-2014-0459: Better color profiling (in-tree LCMS)
S8031352, CVE-2013-6954: Enhance PNG handling (in-tree libpng)
S8031394, CVE-2014-0457: (sl) Fix exception handling in ServiceLoader
S8031395: Enhance LDAP processing
S8032686, CVE-2014-2413: Issues with method invoke
S8033618, CVE-2014-1876: Correct logging output
S8034926, CVE-2014-2397: Attribute classes properly
S8036794, CVE-2014-0461: Manage JavaScript instances
A myriad of regular bug fixes. And ARM JIT is now enabled by default.
|
| |
|
|
|