/hg/release/icedtea6-1.12: 5 new changesets
omajid at icedtea.classpath.org
omajid at icedtea.classpath.org
Mon Jul 8 12:05:24 PDT 2013
changeset 08ce3247b5b0 in /hg/release/icedtea6-1.12
details: http://icedtea.classpath.org/hg/release/icedtea6-1.12?cmd=changeset;node=08ce3247b5b0
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Sat Jun 22 16:38:24 2013 -0500
Add 2013/06/18 security patches.
2013-06-22 Andrew John Hughes <gnu.andrew at member.fsf.org>
* patches/idresolver_fix.patch:
Removed. Part of 6469266.
* Makefile.am:
(SECURITY_PATCHES): Add new ones.
(SPECIAL_SECURITY_PATCH_1): Renamed from
SPECIAL_SECURITY_PATCH.
(SPECIAL_SECURITY_PATCH_2): Add 8009071, which
needs to be applied after some AWT backports.
(ICEDTEA_PATCHES): Use SPECIAL_SECURITY_PATCH_{1,2}.
Move 8005615, 8007393 & 8007611 to SECURITY_PATCHES
as must be applied before 8004584. Add 7171223 to
end.
* patches/openjdk/6307603-xrender-01.patch,
* patches/openjdk/6469266-xmlsec_1.4.2.patch,
* patches/openjdk/6656651-windows_lcd_glyphs.patch,
* patches/openjdk/6786028-wcag_bold_tags.patch,
* patches/openjdk/6786682-wcag_lang.patch,
* patches/openjdk/6786688-wcag_table.patch,
* patches/openjdk/6786690-wcag_dl.patch,
* patches/openjdk/6802694-no_deprecated.patch,
* patches/openjdk/6851834-restructure.patch,
* patches/openjdk/6888167-medialib_memory_leaks.patch,
* patches/openjdk/6961178-doclet_xml.patch,
* patches/openjdk/6990754-use_native_memory_for_symboltable.patch,
* patches/openjdk/7006270-regressions.patch,
* patches/openjdk/7008809-report_class_in_arraystoreexception.patch,
* patches/openjdk/7014851-unused_parallel_compaction_code.patch,
* patches/openjdk/7017732-move_static_fields_to_class.patch,
* patches/openjdk/7036747-elfstringtable.patch,
* patches/openjdk/7086585-flexible_field_injection.patch,
* patches/openjdk/7171223-strict_aliasing.patch,
* patches/openjdk/7195301-no_instanceof_node.patch,
* patches/security/20130618/6741606-apache_santuario.patch,
* patches/security/20130618/7158805-nested_subroutine_rewriting.patch,
* patches/security/20130618/7170730-windows_network_stack.patch,
* patches/security/20130618/8000638-improve_deserialization.patch,
* patches/security/20130618/8000642-better_transportation_handling.patch,
* patches/security/20130618/8001032-restrict_object_access-corba.patch,
* patches/security/20130618/8001032-restrict_object_access-jdk.patch,
* patches/security/20130618/8001033-refactor_address_handling.patch,
* patches/security/20130618/8001034-memory_management.patch,
* patches/security/20130618/8001038-resourcefully_handle_resources.patch,
* patches/security/20130618/8001043-clarify_definition_restrictions.patch,
* patches/security/20130618/8001309-better_handling_of_annotation_interfaces.patch,
* patches/security/20130618/8001318-6_fixup.patch,
* patches/security/20130618/8001318-socket_getlocaladdress_consistency.patch,
* patches/security/20130618/8001330-checking_order_improvement.patch,
* patches/security/20130618/8001330-improve_checking_order.patch,
* patches/security/20130618/8003703-update_rmi_connection_dialog.patch,
* patches/security/20130618/8004584-augment_applet_contextualization.patch,
* patches/security/20130618/8005007-better_glyph_processing.patch,
* patches/security/20130618/8006328-6_fixup.patch,
* patches/security/20130618/8006328-sound_class_robustness.patch,
* patches/security/20130618/8006611-improve_scripting.patch,
* patches/security/20130618/8007467-improve_jmx_internal_api_robustness.patch,
* patches/security/20130618/8007471-6_fixup.patch,
* patches/security/20130618/8007471-improve_mbean_notifications.patch,
* patches/security/20130618/8007812-getenclosingmethod.patch,
* patches/security/20130618/8008120-improve_jmx_class_checking.patch,
* patches/security/20130618/8008124-better_compliance_testing.patch,
* patches/security/20130618/8008128-better_jmx_api_coherence.patch,
* patches/security/20130618/8008132-better_serialization.patch,
* patches/security/20130618/8008585-jmx_data_handling.patch,
* patches/security/20130618/8008593-better_urlclassloader.patch,
* patches/security/20130618/8008603-jmx_provider_provision.patch,
* patches/security/20130618/8008611-6_fixup.patch,
* patches/security/20130618/8008611-jmx_annotations.patch,
* patches/security/20130618/8008615-jmx_internal_api_robustness.patch,
* patches/security/20130618/8008623-mbeanserver_handling.patch,
* patches/security/20130618/8008744-6741606_rework.patch,
* patches/security/20130618/8008982-jmx_interface_changes.patch,
* patches/security/20130618/8009004-rmi_connection_improvement.patch,
* patches/security/20130618/8009013-t2k_glyphs.patch,
* patches/security/20130618/8009034-jmx_notification_improvement.patch,
* patches/security/20130618/8009038-jmx_notification_support_improvement.patch,
* patches/security/20130618/8009067-improve_key_storing.patch,
* patches/security/20130618/8009071-improve_shape_handling.patch,
* patches/security/20130618/8009235-improve_tsa_data_handling.patch,
* patches/security/20130618/8009554-serialjavaobject.patch,
* patches/security/20130618/8011243-improve_imaginglib.patch,
* patches/security/20130618/8011248-better_component_rasters.patch,
* patches/security/20130618/8011253-better_short_component_rasters.patch,
* patches/security/20130618/8011257-better_byte_component_rasters.patch,
* patches/security/20130618/8011557-improve_reflection.patch,
* patches/security/20130618/8012375-javadoc_framing.patch,
* patches/security/20130618/8012421-better_positioning.patch,
* patches/security/20130618/8012438-better_image_validation.patch,
* patches/security/20130618/8012597-better_image_channel_validation.patch,
* patches/security/20130618/8012601-better_layout_validation.patch,
* patches/security/20130618/8014281-better_xml_signature_checking.patch,
* patches/security/20130618/8015997-more_javadoc_framing.patch,
* patches/security/20130618/diamond_fix.patch,
* patches/security/20130618/handle_npe.patch,
* patches/security/20130618/hs_merge-01.patch,
* patches/security/20130618/hs_merge-02.patch,
* patches/security/20130618/hs_merge-03.patch,
* patches/security/20130618/hs_merge-04.patch,
* patches/security/20130618/javac_issue.patch,
* patches/security/20130618/langtools_generics.patch,
* patches/security/20130618/langtools_merge-01.patch,
* patches/security/20130618/langtools_merge-02.patch,
* patches/security/20130618/langtools_merge-03.patch:
2013/06/18 security patches.
* patches/apache-xml-internal-fix-bug-38655.patch: Remove.
changeset c152bd08c25e in /hg/release/icedtea6-1.12
details: http://icedtea.classpath.org/hg/release/icedtea6-1.12?cmd=changeset;node=c152bd08c25e
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Tue Jun 25 15:07:59 2013 +0100
Correct issues found in building security patches.
2013-06-24 Andrew John Hughes <gnu.andrew at redhat.com>
* Makefile.am:
(ICEDTEA_PATCHES): Move 8009071 after library patch.
* NEWS: Correct bug ID referenced for OJ3.
* patches/ecj/needs-6.patch:
Add cases for javax.sound and javax.management, due
to @Override annotations in the security patches.
* patches/openjdk/6307603-xrender-01.patch:
Regenerated again as wrong last time.
* patches/security/20130618/8009071-improve_shape_handling.patch:
Include sizecalc.h in gif_lib.h.
changeset 698ae40e2dc4 in /hg/release/icedtea6-1.12
details: http://icedtea.classpath.org/hg/release/icedtea6-1.12?cmd=changeset;node=698ae40e2dc4
author: Omair Majid <omajid at redhat.com>
date: Wed Jun 26 10:47:13 2013 -0400
Fix patches to work with patch tools that can not handle renames
2013-06-26 Omair Majid <omajid at redhat.com>
* Makefile.am:
(SECURITY_PATCHES): Add patches/openjdk/6990754-handle_renames.patch and
patches/openjdk/6851834-handle_renames.patch
* patches/openjdk/6990754-use_native_memory_for_symboltable.patch: Don't
rename files using extended-diff-style.
* patches/openjdk/6990754-handle_renames.patch: New file. Contains the
rename portion of 6990754 since some patch programs can not handle
renames.
* patches/openjdk/6851834-restructure.patch: Don't rename files using
extended-diff-style.
* patches/openjdk/6851834-handle_renames.patch: New file. Contains rename
porition of 6851834 since some patch programs can not handle renames.
changeset 1413106f03ad in /hg/release/icedtea6-1.12
details: http://icedtea.classpath.org/hg/release/icedtea6-1.12?cmd=changeset;node=1413106f03ad
author: Omair Majid <omajid at redhat.com>
date: Wed Jun 26 13:45:20 2013 -0400
Drop unnecessary patch for S8009554
2013-06-26 Omair Majid <omajid at redhat.com>
Severin Gehwolf <sgehwolf at redhat.com>
* Makefile.am (SECURITY_PATCHES): Drop
patches/security/20130618/8009554-serialjavaobject.patch.
* patches/security/20130618/8009554-serialjavaobject.patch: Remove. This
was adding redundant permission check
changeset a6de0621a57b in /hg/release/icedtea6-1.12
details: http://icedtea.classpath.org/hg/release/icedtea6-1.12?cmd=changeset;node=a6de0621a57b
author: chrisphi
date: Wed Jun 26 15:10:59 2013 -0400
Summary: Backport 20130618 sec fixes 7158805 and 8001330
added patches/security/20130618/7158805-nested_subroutine_rewriting-it6.patch
added patches/security/20130618/8001330-checking_order_improvement-it6.patch
changed ChangeLog
changed Makefile.am
diffstat:
ChangeLog | 169 +-
Makefile.am | 96 +-
NEWS | 2 +-
patches/apache-xml-internal-fix-bug-38655.patch | 11 -
patches/ecj/needs-6.patch | 24 +
patches/idresolver_fix.patch | 194 -
patches/openjdk/6307603-xrender-01.patch | 239 +-
patches/openjdk/6469266-xmlsec_1.4.2.patch | 23876 ++++++++
patches/openjdk/6656651-windows_lcd_glyphs.patch | 938 +
patches/openjdk/6764553-IdResolver_is_not_thread_safe.patch | 4 +-
patches/openjdk/6786028-wcag_bold_tags.patch | 2914 +
patches/openjdk/6786682-wcag_lang.patch | 274 +
patches/openjdk/6786688-wcag_table.patch | 2828 +
patches/openjdk/6786690-wcag_dl.patch | 3230 +
patches/openjdk/6802694-no_deprecated.patch | 601 +
patches/openjdk/6851834-handle_renames.patch | 605 +
patches/openjdk/6851834-restructure.patch | 26853 ++++++++++
patches/openjdk/6888167-medialib_memory_leaks.patch | 134 +
patches/openjdk/6961178-doclet_xml.patch | 1989 +
patches/openjdk/6980681-corba_deadlock.patch | 7 -
patches/openjdk/6990754-handle_renames.patch | 925 +
patches/openjdk/6990754-use_native_memory_for_symboltable.patch | 18949 +++++++
patches/openjdk/7006270-regressions.patch | 299 +
patches/openjdk/7008809-report_class_in_arraystoreexception.patch | 189 +
patches/openjdk/7014851-unused_parallel_compaction_code.patch | 810 +
patches/openjdk/7017732-move_static_fields_to_class.patch | 3079 +
patches/openjdk/7036747-elfstringtable.patch | 130 +
patches/openjdk/7086585-flexible_field_injection.patch | 3424 +
patches/openjdk/7162902-corba_fixes.patch | 21 -
patches/openjdk/7171223-strict_aliasing.patch | 25 +
patches/openjdk/7195301-no_instanceof_node.patch | 86 +
patches/security/20130618/6741606-apache_santuario.patch | 8110 +++
patches/security/20130618/7158805-nested_subroutine_rewriting-it6.patch | 743 +
patches/security/20130618/7158805-nested_subroutine_rewriting.patch | 448 +
patches/security/20130618/7170730-windows_network_stack.patch | 1057 +
patches/security/20130618/8000638-improve_deserialization.patch | 26 +
patches/security/20130618/8000642-better_transportation_handling.patch | 808 +
patches/security/20130618/8001032-restrict_object_access-corba.patch | 544 +
patches/security/20130618/8001032-restrict_object_access-jdk.patch | 21 +
patches/security/20130618/8001033-refactor_address_handling.patch | 119 +
patches/security/20130618/8001034-memory_management.patch | 78 +
patches/security/20130618/8001038-resourcefully_handle_resources.patch | 236 +
patches/security/20130618/8001043-clarify_definition_restrictions.patch | 92 +
patches/security/20130618/8001309-better_handling_of_annotation_interfaces.patch | 36 +
patches/security/20130618/8001318-6_fixup.patch | 114 +
patches/security/20130618/8001318-socket_getlocaladdress_consistency.patch | 470 +
patches/security/20130618/8001330-checking_order_improvement-it6.patch | 500 +
patches/security/20130618/8001330-checking_order_improvement.patch | 380 +
patches/security/20130618/8001330-improve_checking_order.patch | 97 +
patches/security/20130618/8003703-update_rmi_connection_dialog.patch | 131 +
patches/security/20130618/8004584-augment_applet_contextualization.patch | 322 +
patches/security/20130618/8005007-better_glyph_processing.patch | 118 +
patches/security/20130618/8006328-6_fixup.patch | 31 +
patches/security/20130618/8006328-sound_class_robustness.patch | 6936 ++
patches/security/20130618/8006611-improve_scripting.patch | 78 +
patches/security/20130618/8007467-improve_jmx_internal_api_robustness.patch | 108 +
patches/security/20130618/8007471-6_fixup.patch | 25 +
patches/security/20130618/8007471-improve_mbean_notifications.patch | 89 +
patches/security/20130618/8007812-getenclosingmethod.patch | 89 +
patches/security/20130618/8008120-improve_jmx_class_checking.patch | 332 +
patches/security/20130618/8008124-better_compliance_testing.patch | 20 +
patches/security/20130618/8008128-better_jmx_api_coherence.patch | 110 +
patches/security/20130618/8008132-better_serialization.patch | 121 +
patches/security/20130618/8008585-jmx_data_handling.patch | 69 +
patches/security/20130618/8008593-better_urlclassloader.patch | 270 +
patches/security/20130618/8008603-jmx_provider_provision.patch | 29 +
patches/security/20130618/8008611-6_fixup.patch | 20 +
patches/security/20130618/8008611-jmx_annotations.patch | 32 +
patches/security/20130618/8008615-jmx_internal_api_robustness.patch | 70 +
patches/security/20130618/8008623-mbeanserver_handling.patch | 121 +
patches/security/20130618/8008744-6741606_rework.patch | 882 +
patches/security/20130618/8008982-jmx_interface_changes.patch | 168 +
patches/security/20130618/8009004-rmi_connection_improvement.patch | 54 +
patches/security/20130618/8009013-t2k_glyphs.patch | 39 +
patches/security/20130618/8009034-jmx_notification_improvement.patch | 30 +
patches/security/20130618/8009038-jmx_notification_support_improvement.patch | 89 +
patches/security/20130618/8009067-improve_key_storing.patch | 20 +
patches/security/20130618/8009071-improve_shape_handling.patch | 1014 +
patches/security/20130618/8009235-improve_tsa_data_handling.patch | 80 +
patches/security/20130618/8011243-improve_imaginglib.patch | 618 +
patches/security/20130618/8011248-better_component_rasters.patch | 51 +
patches/security/20130618/8011253-better_short_component_rasters.patch | 140 +
patches/security/20130618/8011257-better_byte_component_rasters.patch | 157 +
patches/security/20130618/8011557-improve_reflection.patch | 132 +
patches/security/20130618/8012375-javadoc_framing.patch | 61 +
patches/security/20130618/8012421-better_positioning.patch | 100 +
patches/security/20130618/8012438-better_image_validation.patch | 283 +
patches/security/20130618/8012597-better_image_channel_validation.patch | 597 +
patches/security/20130618/8012601-better_layout_validation.patch | 125 +
patches/security/20130618/8014281-better_xml_signature_checking.patch | 49 +
patches/security/20130618/8015997-more_javadoc_framing.patch | 21 +
patches/security/20130618/diamond_fix.patch | 55 +
patches/security/20130618/handle_npe.patch | 21 +
patches/security/20130618/hs_merge-01.patch | 284 +
patches/security/20130618/hs_merge-02.patch | 155 +
patches/security/20130618/hs_merge-03.patch | 18 +
patches/security/20130618/hs_merge-04.patch | 44 +
patches/security/20130618/javac_issue.patch | 60 +
patches/security/20130618/langtools_generics.patch | 600 +
patches/security/20130618/langtools_merge-01.patch | 30 +
patches/security/20130618/langtools_merge-02.patch | 30 +
patches/security/20130618/langtools_merge-03.patch | 18 +
102 files changed, 121588 insertions(+), 362 deletions(-)
diffs (truncated from 123104 to 500 lines):
diff -r 36d69d052be1 -r a6de0621a57b ChangeLog
--- a/ChangeLog Thu Apr 25 14:14:05 2013 +0100
+++ b/ChangeLog Wed Jun 26 15:10:59 2013 -0400
@@ -1,4 +1,171 @@
-2013-04-25 Andrew John Hughes <gnu.andrew at member.fsf.org>
+2013-06-26 Chris Phillips <chrisphi at redhat.com>
+ * Makefile.am (SECURITY_PATCHES): Drop
+ patches/security/20130618/7158805-nested_subroutine_rewriting.patch
+ patches/security/20130618/8001330-checking_order_improvement.patch
+ patches/openjdk/7036747-elfstringtable.patch
+ patches/openjdk/7017732-move_static_fields_to_class.patch
+ patches/openjdk/6990754-use_native_memory_for_symboltable.patch
+ patches/openjdk/6990754-handle_renames.patch
+ patches/openjdk/7008809-report_class_in_arraystoreexception.patch
+ patches/openjdk/7086585-flexible_field_injection.patch
+ patches/security/20130618/hs_merge-01.patch
+ patches/security/20130618/hs_merge-02.patch
+ patches/security/20130618/hs_merge-03.patch
+ patches/openjdk/7014851-unused_parallel_compaction_code.patch
+ patches/security/20130618/hs_merge-04.patch
+ Add:
+ patches/security/20130618/7158805-nested_subroutine_rewriting-it6.patch
+ patches/security/20130618/8001330-checking_order_improvement-it6.patch
+ * patches/security/20130618/7158805-nested_subroutine_rewriting-it6.patch:
+ Backported fix for 7158805.
+ * patches/security/20130618/8001330-checking_order_improvement-it6.patch:
+ Backported fix for hs portion of 8001330.
+
+2013-06-26 Omair Majid <omajid at redhat.com>
+ Severin Gehwolf <sgehwolf at redhat.com>
+
+ * Makefile.am (SECURITY_PATCHES): Drop
+ patches/security/20130618/8009554-serialjavaobject.patch.
+ * patches/security/20130618/8009554-serialjavaobject.patch: Remove. This
+ was adding redundant permission checking.
+
+2013-06-26 Omair Majid <omajid at redhat.com>
+
+ * Makefile.am:
+ (SECURITY_PATCHES): Add patches/openjdk/6990754-handle_renames.patch and
+ patches/openjdk/6851834-handle_renames.patch
+ * patches/openjdk/6990754-use_native_memory_for_symboltable.patch: Don't
+ rename files using extended-diff-style.
+ * patches/openjdk/6990754-handle_renames.patch: New file. Contains the
+ rename portion of 6990754 since some patch programs can not handle
+ renames.
+ * patches/openjdk/6851834-restructure.patch: Don't rename files using
+ extended-diff-style.
+ * patches/openjdk/6851834-handle_renames.patch: New file. Contains rename
+ porition of 6851834 since some patch programs can not handle renames.
+
+2013-06-24 Andrew John Hughes <gnu.andrew at redhat.com>
+
+ * Makefile.am:
+ (ICEDTEA_PATCHES): Move 8009071 after library patch.
+ * NEWS: Correct bug ID referenced for OJ3.
+ * patches/ecj/needs-6.patch:
+ Add cases for javax.sound and javax.management, due
+ to @Override annotations in the security patches.
+ * patches/openjdk/6307603-xrender-01.patch:
+ Regenerated again as wrong last time.
+ * patches/security/20130618/8009071-improve_shape_handling.patch:
+ Include sizecalc.h in gif_lib.h.
+
+2013-06-22 Andrew John Hughes <gnu.andrew at redhat.com>
+
+ * patches/idresolver_fix.patch:
+ Removed. Part of 6469266.
+ * Makefile.am:
+ (SECURITY_PATCHES): Add new ones.
+ (SPECIAL_SECURITY_PATCH_1): Renamed from
+ SPECIAL_SECURITY_PATCH.
+ (SPECIAL_SECURITY_PATCH_2): Add 8009071, which
+ needs to be applied after some AWT backports.
+ (ICEDTEA_PATCHES): Use SPECIAL_SECURITY_PATCH_{1,2}.
+ Move 8005615, 8007393 & 8007611 to SECURITY_PATCHES
+ as must be applied before 8004584. Add 7171223 to
+ end.
+ * patches/openjdk/6307603-xrender-01.patch:
+ Regenerated.
+ * patches/openjdk/6469266-xmlsec_1.4.2.patch,
+ * patches/openjdk/6656651-windows_lcd_glyphs.patch,
+ * patches/openjdk/6786028-wcag_bold_tags.patch,
+ * patches/openjdk/6786682-wcag_lang.patch,
+ * patches/openjdk/6786688-wcag_table.patch,
+ * patches/openjdk/6786690-wcag_dl.patch,
+ * patches/openjdk/6802694-no_deprecated.patch,
+ * patches/openjdk/6851834-restructure.patch,
+ * patches/openjdk/6888167-medialib_memory_leaks.patch,
+ * patches/openjdk/6961178-doclet_xml.patch,
+ * patches/openjdk/6990754-use_native_memory_for_symboltable.patch,
+ * patches/openjdk/7006270-regressions.patch,
+ * patches/openjdk/7008809-report_class_in_arraystoreexception.patch,
+ * patches/openjdk/7014851-unused_parallel_compaction_code.patch,
+ * patches/openjdk/7017732-move_static_fields_to_class.patch,
+ * patches/openjdk/7036747-elfstringtable.patch,
+ * patches/openjdk/7086585-flexible_field_injection.patch,
+ * patches/openjdk/7171223-strict_aliasing.patch,
+ * patches/openjdk/7195301-no_instanceof_node.patch,
+ * patches/security/20130618/6741606-apache_santuario.patch,
+ * patches/security/20130618/7158805-nested_subroutine_rewriting.patch,
+ * patches/security/20130618/7170730-windows_network_stack.patch,
+ * patches/security/20130618/8000638-improve_deserialization.patch,
+ * patches/security/20130618/8000642-better_transportation_handling.patch,
+ * patches/security/20130618/8001032-restrict_object_access-corba.patch,
+ * patches/security/20130618/8001032-restrict_object_access-jdk.patch,
+ * patches/security/20130618/8001033-refactor_address_handling.patch,
+ * patches/security/20130618/8001034-memory_management.patch,
+ * patches/security/20130618/8001038-resourcefully_handle_resources.patch,
+ * patches/security/20130618/8001043-clarify_definition_restrictions.patch,
+ * patches/security/20130618/8001309-better_handling_of_annotation_interfaces.patch,
+ * patches/security/20130618/8001318-6_fixup.patch,
+ * patches/security/20130618/8001318-socket_getlocaladdress_consistency.patch,
+ * patches/security/20130618/8001330-checking_order_improvement.patch,
+ * patches/security/20130618/8001330-improve_checking_order.patch,
+ * patches/security/20130618/8003703-update_rmi_connection_dialog.patch,
+ * patches/security/20130618/8004584-augment_applet_contextualization.patch,
+ * patches/security/20130618/8005007-better_glyph_processing.patch,
+ * patches/security/20130618/8006328-6_fixup.patch,
+ * patches/security/20130618/8006328-sound_class_robustness.patch,
+ * patches/security/20130618/8006611-improve_scripting.patch,
+ * patches/security/20130618/8007467-improve_jmx_internal_api_robustness.patch,
+ * patches/security/20130618/8007471-6_fixup.patch,
+ * patches/security/20130618/8007471-improve_mbean_notifications.patch,
+ * patches/security/20130618/8007812-getenclosingmethod.patch,
+ * patches/security/20130618/8008120-improve_jmx_class_checking.patch,
+ * patches/security/20130618/8008124-better_compliance_testing.patch,
+ * patches/security/20130618/8008128-better_jmx_api_coherence.patch,
+ * patches/security/20130618/8008132-better_serialization.patch,
+ * patches/security/20130618/8008585-jmx_data_handling.patch,
+ * patches/security/20130618/8008593-better_urlclassloader.patch,
+ * patches/security/20130618/8008603-jmx_provider_provision.patch,
+ * patches/security/20130618/8008611-6_fixup.patch,
+ * patches/security/20130618/8008611-jmx_annotations.patch,
+ * patches/security/20130618/8008615-jmx_internal_api_robustness.patch,
+ * patches/security/20130618/8008623-mbeanserver_handling.patch,
+ * patches/security/20130618/8008744-6741606_rework.patch,
+ * patches/security/20130618/8008982-jmx_interface_changes.patch,
+ * patches/security/20130618/8009004-rmi_connection_improvement.patch,
+ * patches/security/20130618/8009013-t2k_glyphs.patch,
+ * patches/security/20130618/8009034-jmx_notification_improvement.patch,
+ * patches/security/20130618/8009038-jmx_notification_support_improvement.patch,
+ * patches/security/20130618/8009067-improve_key_storing.patch,
+ * patches/security/20130618/8009071-improve_shape_handling.patch,
+ * patches/security/20130618/8009235-improve_tsa_data_handling.patch,
+ * patches/security/20130618/8009554-serialjavaobject.patch,
+ * patches/security/20130618/8011243-improve_imaginglib.patch,
+ * patches/security/20130618/8011248-better_component_rasters.patch,
+ * patches/security/20130618/8011253-better_short_component_rasters.patch,
+ * patches/security/20130618/8011257-better_byte_component_rasters.patch,
+ * patches/security/20130618/8011557-improve_reflection.patch,
+ * patches/security/20130618/8012375-javadoc_framing.patch,
+ * patches/security/20130618/8012421-better_positioning.patch,
+ * patches/security/20130618/8012438-better_image_validation.patch,
+ * patches/security/20130618/8012597-better_image_channel_validation.patch,
+ * patches/security/20130618/8012601-better_layout_validation.patch,
+ * patches/security/20130618/8014281-better_xml_signature_checking.patch,
+ * patches/security/20130618/8015997-more_javadoc_framing.patch,
+ * patches/security/20130618/diamond_fix.patch,
+ * patches/security/20130618/handle_npe.patch,
+ * patches/security/20130618/hs_merge-01.patch,
+ * patches/security/20130618/hs_merge-02.patch,
+ * patches/security/20130618/hs_merge-03.patch,
+ * patches/security/20130618/hs_merge-04.patch,
+ * patches/security/20130618/javac_issue.patch,
+ * patches/security/20130618/langtools_generics.patch,
+ * patches/security/20130618/langtools_merge-01.patch,
+ * patches/security/20130618/langtools_merge-02.patch,
+ * patches/security/20130618/langtools_merge-03.patch:
+ 2013/06/18 security patches.
+ * patches/apache-xml-internal-fix-bug-38655.patch: Remove.
+
+2013-04-25 Andrew John Hughes <gnu.andrew at redhat.com>
* configure.ac: Bump to 1.12.6pre.
* NEWS: Add section for 1.12.6.
diff -r 36d69d052be1 -r a6de0621a57b Makefile.am
--- a/Makefile.am Thu Apr 25 14:14:05 2013 +0100
+++ b/Makefile.am Wed Jun 26 15:10:59 2013 -0400
@@ -336,9 +336,89 @@
patches/security/20130416/8009305.patch \
patches/security/20130416/8009699.patch \
patches/security/20130416/8009814.patch \
- patches/security/20130416/8009857.patch
+ patches/security/20130416/8009857.patch \
+ patches/openjdk/7195301-no_instanceof_node.patch \
+ patches/openjdk/6469266-xmlsec_1.4.2.patch \
+ patches/security/20130618/6741606-apache_santuario.patch \
+ patches/security/20130618/7170730-windows_network_stack.patch \
+ patches/security/20130618/8000638-improve_deserialization.patch \
+ patches/security/20130618/8001032-restrict_object_access-corba.patch \
+ patches/security/20130618/8001032-restrict_object_access-jdk.patch \
+ patches/security/20130618/8001033-refactor_address_handling.patch \
+ patches/security/20130618/8001034-memory_management.patch \
+ patches/security/20130618/8001038-resourcefully_handle_resources.patch \
+ patches/security/20130618/8001043-clarify_definition_restrictions.patch \
+ patches/security/20130618/8001309-better_handling_of_annotation_interfaces.patch \
+ patches/security/20130618/8001318-socket_getlocaladdress_consistency.patch \
+ patches/security/20130618/8001318-6_fixup.patch \
+ patches/security/20130618/8001330-improve_checking_order.patch \
+ patches/security/20130618/8003703-update_rmi_connection_dialog.patch \
+ patches/openjdk/8005615-failure_to_load_logger_implementation.patch \
+ patches/openjdk/8007393.patch \
+ patches/openjdk/8007611.patch \
+ patches/security/20130618/8004584-augment_applet_contextualization.patch \
+ patches/security/20130618/8005007-better_glyph_processing.patch \
+ patches/security/20130618/8006328-sound_class_robustness.patch \
+ patches/security/20130618/8006328-6_fixup.patch \
+ patches/security/20130618/8006611-improve_scripting.patch \
+ patches/security/20130618/8007467-improve_jmx_internal_api_robustness.patch \
+ patches/security/20130618/8007471-improve_mbean_notifications.patch \
+ patches/security/20130618/8007471-6_fixup.patch \
+ patches/security/20130618/8007812-getenclosingmethod.patch \
+ patches/security/20130618/8008120-improve_jmx_class_checking.patch \
+ patches/security/20130618/8008124-better_compliance_testing.patch \
+ patches/security/20130618/8008128-better_jmx_api_coherence.patch \
+ patches/security/20130618/8008132-better_serialization.patch \
+ patches/security/20130618/8008585-jmx_data_handling.patch \
+ patches/security/20130618/8008593-better_urlclassloader.patch \
+ patches/security/20130618/8008603-jmx_provider_provision.patch \
+ patches/security/20130618/8008611-jmx_annotations.patch \
+ patches/security/20130618/8008611-6_fixup.patch \
+ patches/security/20130618/8008615-jmx_internal_api_robustness.patch \
+ patches/security/20130618/8008623-mbeanserver_handling.patch \
+ patches/security/20130618/8008744-6741606_rework.patch \
+ patches/security/20130618/8008982-jmx_interface_changes.patch \
+ patches/security/20130618/8009004-rmi_connection_improvement.patch \
+ patches/security/20130618/8009013-t2k_glyphs.patch \
+ patches/security/20130618/8009034-jmx_notification_improvement.patch \
+ patches/security/20130618/8009038-jmx_notification_support_improvement.patch \
+ patches/security/20130618/8009067-improve_key_storing.patch \
+ patches/security/20130618/8009235-improve_tsa_data_handling.patch \
+ patches/openjdk/6888167-medialib_memory_leaks.patch \
+ patches/security/20130618/8011243-improve_imaginglib.patch \
+ patches/security/20130618/8011248-better_component_rasters.patch \
+ patches/security/20130618/8011253-better_short_component_rasters.patch \
+ patches/security/20130618/8011257-better_byte_component_rasters.patch \
+ patches/security/20130618/8011557-improve_reflection.patch \
+ patches/security/20130618/8012421-better_positioning.patch \
+ patches/security/20130618/8012438-better_image_validation.patch \
+ patches/security/20130618/8012597-better_image_channel_validation.patch \
+ patches/security/20130618/8012601-better_layout_validation.patch \
+ patches/security/20130618/8014281-better_xml_signature_checking.patch \
+ patches/security/20130618/diamond_fix.patch \
+ patches/security/20130618/handle_npe.patch \
+ patches/security/20130618/javac_issue.patch \
+ patches/security/20130618/7158805-nested_subroutine_rewriting-it6.patch \
+ patches/security/20130618/8001330-checking_order_improvement-it6.patch \
+ patches/security/20130618/8000642-better_transportation_handling.patch \
+ patches/openjdk/6786028-wcag_bold_tags.patch \
+ patches/openjdk/6786682-wcag_lang.patch \
+ patches/openjdk/6802694-no_deprecated.patch \
+ patches/openjdk/6786690-wcag_dl.patch \
+ patches/openjdk/6786688-wcag_table.patch \
+ patches/openjdk/6961178-doclet_xml.patch \
+ patches/openjdk/6851834-restructure.patch \
+ patches/openjdk/6851834-handle_renames.patch \
+ patches/openjdk/7006270-regressions.patch \
+ patches/security/20130618/8012375-javadoc_framing.patch \
+ patches/security/20130618/8015997-more_javadoc_framing.patch \
+ patches/security/20130618/langtools_merge-01.patch \
+ patches/security/20130618/langtools_merge-02.patch \
+ patches/security/20130618/langtools_generics.patch \
+ patches/security/20130618/langtools_merge-03.patch
-SPECIAL_SECURITY_PATCH = patches/security/20120214/7112642.patch
+SPECIAL_SECURITY_PATCH_1 = patches/security/20120214/7112642.patch
+SPECIAL_SECURITY_PATCH_2 = patches/security/20130618/8009071-improve_shape_handling.patch
ICEDTEA_PATCHES = \
$(DROP_PATCHES) \
@@ -355,13 +435,14 @@
patches/openjdk/6725214-direct3d-01.patch \
patches/openjdk/6748082-isDisplayLocal.patch \
patches/openjdk/6633275-shaped_translucent_windows.patch \
- $(SPECIAL_SECURITY_PATCH) \
+ $(SPECIAL_SECURITY_PATCH_1) \
patches/openjdk/6769607-modal-hangs.patch \
patches/openjdk/6791612-opengl-jni-fix.patch \
patches/openjdk/6755274-glgetstring-crash.patch \
patches/openjdk/6984543-onscreen_rendering_resize_test.patch \
patches/openjdk/6693253-security_warning.patch \
patches/openjdk/6444769-windowwithwarningtest.patch \
+ patches/openjdk/6656651-windows_lcd_glyphs.patch \
patches/notice-safepoints.patch \
patches/parisc-opt.patch \
patches/lucene-crash.patch \
@@ -374,6 +455,7 @@
patches/gcc-suffix.patch \
patches/memory-limits.patch \
patches/libraries.patch \
+ $(SPECIAL_SECURITY_PATCH_2) \
patches/jvmtiEnv.patch \
patches/lcms.patch \
patches/print_lsb_release.patch \
@@ -540,8 +622,6 @@
patches/ScriptEngineManager-doc.patch \
patches/openjdk/6883983-JarVerifier_removed_dependency_sun_security_pkcs.patch \
patches/openjdk/4465490-Suspicious_double-check_locking_idiom.patch \
- patches/idresolver_fix.patch \
- patches/apache-xml-internal-fix-bug-38655.patch \
patches/openjdk/6792400-Avoid_loading_Normalizer_resources.patch \
patches/openjdk/7088989-ucrypto_tests.patch \
patches/generalise_crypto_tests.patch \
@@ -563,18 +643,16 @@
patches/openjdk/7162902-corba_fixes.patch \
patches/traceable.patch \
patches/openjdk/7010849-modernise_sa.patch \
- patches/openjdk/8005615-failure_to_load_logger_implementation.patch \
patches/openjdk/8004341-jck_dialog_failure.patch \
patches/openjdk/8004341-jck_dialog_failure-02.patch \
patches/pr1319-support_giflib_5.patch \
- patches/openjdk/8007393.patch \
- patches/openjdk/8007611.patch \
patches/fix_get_stack_bounds_leak.patch \
patches/openjdk/7197906-handle_32_bit_shifts.patch \
patches/aarch64.patch \
patches/jaxws-tempfiles-ioutils-6.patch \
patches/object-factory-cl-internal.patch \
- patches/openjdk/8009530-icu_kern_table_support_broken.patch
+ patches/openjdk/8009530-icu_kern_table_support_broken.patch \
+ patches/openjdk/7171223-strict_aliasing.patch
if WITH_RHINO
ICEDTEA_PATCHES += \
diff -r 36d69d052be1 -r a6de0621a57b NEWS
--- a/NEWS Thu Apr 25 14:14:05 2013 +0100
+++ b/NEWS Wed Jun 26 15:10:59 2013 -0400
@@ -63,7 +63,7 @@
- S7133220: Additional patches to JAXP 1.4.5 update 1 for 7u4 (partial for S6657673)
- S8009530: ICU Kern table support broken
* Bug fixes
- - OJ3: Fix get_stack_bounds memory leak (alternate fix for S7197906)
+ - OJ3: Fix get_stack_bounds memory leak (alternate fix for S7017193)
- PR1362: Fedora 19 / rawhide FTBFS SIGILL
- PR1338: Remove dependence on libXp
- PR1339: Simplify the rhino class rewriter to avoid use of concurrency
diff -r 36d69d052be1 -r a6de0621a57b patches/apache-xml-internal-fix-bug-38655.patch
--- a/patches/apache-xml-internal-fix-bug-38655.patch Thu Apr 25 14:14:05 2013 +0100
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,11 +0,0 @@
-diff -u -r /jck/apache-xml/icedtea6/openjdk/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/c14n/implementations/NameSpaceSymbTable.java security/c14n/implementations/NameSpaceSymbTable.java
---- openjdk/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/c14n/implementations/NameSpaceSymbTable.java 2011-11-14 23:11:46.000000000 +0100
-+++ openjdk/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/c14n/implementations/NameSpaceSymbTable.java 2012-03-16 17:52:37.000000000 +0100
-@@ -370,6 +370,7 @@
- if (cur == null || (cur.equals( obj))) {
- return index;
- }
-+ length=length-1;
- do {
- index=index==length? 0:++index;
- cur = set[index];
diff -r 36d69d052be1 -r a6de0621a57b patches/ecj/needs-6.patch
--- a/patches/ecj/needs-6.patch Thu Apr 25 14:14:05 2013 +0100
+++ b/patches/ecj/needs-6.patch Wed Jun 26 15:10:59 2013 -0400
@@ -22,3 +22,27 @@
GEN_DIR=$(GENSRCDIR)/sun/awt/X11
+diff -Nru openjdk-ecj.orig/jdk/make/javax/sound/Makefile openjdk-ecj/jdk/make/javax/sound/Makefile
+--- openjdk-ecj.orig/jdk/make/javax/sound/Makefile 2013-06-24 00:00:22.031254425 +0100
++++ openjdk-ecj/jdk/make/javax/sound/Makefile 2013-06-24 00:01:27.040288124 +0100
+@@ -28,6 +28,8 @@
+ LIBRARY = jsound
+ PRODUCT = sun
+ include $(BUILDDIR)/common/Defs.gmk
++LANGUAGE_VERSION = -source 6
++CLASS_VERSION = -target 6
+
+ # include defines for sound
+ include SoundDefs.gmk
+diff -Nru openjdk-ecj.orig/jdk/make/javax/management/Makefile openjdk-ecj/jdk/make/javax/management/Makefile
+--- openjdk-ecj.orig/jdk/make/javax/management/Makefile 2011-11-14 22:11:40.000000000 +0000
++++ openjdk-ecj/jdk/make/javax/management/Makefile 2013-06-24 00:40:59.742001431 +0100
+@@ -31,6 +31,8 @@
+ PACKAGE = javax.management
+ PRODUCT = sun
+ include $(BUILDDIR)/common/Defs.gmk
++LANGUAGE_VERSION = -source 6
++CLASS_VERSION = -target 6
+
+ #
+ # Files to compile
diff -r 36d69d052be1 -r a6de0621a57b patches/idresolver_fix.patch
--- a/patches/idresolver_fix.patch Thu Apr 25 14:14:05 2013 +0100
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,194 +0,0 @@
---- openjdk/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/utils/IdResolver.java 2012-03-20 20:29:30.000000000 +0100
-+++ openjdk/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/utils/IdResolver.java 2012-03-20 22:18:41.094309861 +0100
-@@ -26,6 +26,7 @@
- import org.w3c.dom.Attr;
- import org.w3c.dom.Document;
- import org.w3c.dom.Element;
-+import org.w3c.dom.NamedNodeMap;
- import org.w3c.dom.Node;
-
- import java.util.Arrays;
-@@ -175,69 +176,124 @@
- return null;
- }
-
-+ private static java.util.List names;
-+ private static int namesLength;
-+ static {
-+ String namespaces[]={
-+ Constants.SignatureSpecNS,
-+ EncryptionConstants.EncryptionSpecNS,
-+ "http://schemas.xmlsoap.org/soap/security/2000-12",
-+ "http://www.w3.org/2002/03/xkms#",
-+ "urn:oasis:names:tc:SAML:1.0:assertion",
-+ "urn:oasis:names:tc:SAML:1.0:protocol"
-+ };
-+ names = Arrays.asList(namespaces);
-+ namesLength = names.size();
-+ }
-
-- static java.util.List names;
-- static {
-- String namespaces[]={ Constants.SignatureSpecNS,
-- EncryptionConstants.EncryptionSpecNS,
-- "http://schemas.xmlsoap.org/soap/security/2000-12",
-- "http://www.w3.org/2002/03/xkms#"
-- };
-- names=Arrays.asList(namespaces);
-- }
-
-+ private static Element getElementBySearching(Node root,String id) {
-+ Element []els=new Element[namesLength + 1];
-+ getEl(root,id,els);
-+ for (int i=0;i<els.length;i++) {
-+ if (els[i]!=null) {
-+ return els[i];
-+ }
-+ }
-+ return null;
-+ }
-
-- private static Element getElementBySearching(Node root,String id) {
-- Element []els=new Element[5];
-- getElementBySearching(root,id,els);
-- for (int i=0;i<els.length;i++) {
-- if (els[i]!=null) {
-- return els[i];
-- }
-- }
-- return null;
-+ private static int getEl(Node currentNode,String id,Element []els) {
-+ Node sibling=null;
-+ Node parentNode=null;
-+ do {
-+ switch (currentNode.getNodeType()) {
-+ case Node.DOCUMENT_FRAGMENT_NODE :
-+ case Node.DOCUMENT_NODE :
-+ sibling= currentNode.getFirstChild();
-+ break;
-+
-+
-+ case Node.ELEMENT_NODE :
-+ Element currentElement = (Element) currentNode;
-+ if (isElement(currentElement, id, els)==1)
-+ return 1;
-+ sibling= currentNode.getFirstChild();
-+ if (sibling==null) {
-+ if (parentNode != null) {
-+ sibling= currentNode.getNextSibling();
-+ }
-+ } else {
-+ parentNode=currentElement;
-+ }
-+ break;
-+ } while (sibling==null && parentNode!=null) {
-+ sibling=parentNode.getNextSibling();
-+ parentNode=parentNode.getParentNode();
-+ if (!(parentNode instanceof Element)) {
-+ parentNode=null;
-+ }
-+ }
-+ if (sibling==null)
-+ return 1;
-+ currentNode=sibling;
-+ sibling=currentNode.getNextSibling();
-+ } while(true);
-
-- }
-- private static int getElementBySearching(Node root,String id,Element []els) {
-- switch (root.getNodeType()) {
-- case Node.ELEMENT_NODE:
-- Element el=(Element)root;
-- if (el.hasAttributes()) {
-- int index=names.indexOf(el.getNamespaceURI());
-- if (index<0) {
-- index=4;
-- }
-- if (el.getAttribute("Id").equals(id)) {
-- els[index]=el;
-- if (index==0) {
-- return 1;
-- }
-- } else if ( el.getAttribute("id").equals(id) ) {
-- if (index!=2) {
More information about the distro-pkg-dev
mailing list