[PATCH] jdk7u161-b01 retro-active security patch review

Andrew Hughes gnu.andrew at redhat.com
Fri Dec 8 18:11:09 UTC 2017


We have a new release of IcedTea (http://bitly.com/it20612) and a new OpenJDK
7 release, u161-b01, to go with it. This is made from the current state of the
OpenJDK 7u repositories plus backports of the new security fixes
included in 8u151.

The tarball is available here:

https://openjdk-sources.osci.io/openjdk7/openjdk7u161-b01.tar.xz

The tarball is accompanied by a digital signature available at:

https://openjdk-sources.osci.io/openjdk7/openjdk7u161-b01.tar.xz.sig

PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net)
Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222

GnuPG >= 2.1 is required to be able to handle this key.

SHA256 checksums:

1c9aa68d584eecf661a6a958d330065388846bf80dac62845e3be5f16f2a78ed
openjdk7u161-b01.tar.xz
fd124d2999f06674179f5049b947d4bac1ef137b04b267e808634a808eba2591
openjdk7u161-b01.tar.xz.sig

They are listed at
https://openjdk-sources.osci.io/openjdk7/openjdk7u161-b01.sha256

I've also uploaded the tarball for the missing openjdk7u141-b02
release from April 2017:

https://openjdk-sources.osci.io/openjdk7/openjdk7u141-b02.tar.xz
https://openjdk-sources.osci.io/openjdk7/openjdk7u141-b02.tar.xz.sig
https://openjdk-sources.osci.io/openjdk7/openjdk7u141-b02.sha256sum

SHA256 checksums:

fd91c3631550467d196ea8924f34b149fc40c24ac3a2ef8ba818d2737b84caec
openjdk7u141-b02.tar.xz
d0b592d064e74e9a2243071b14f4b363ce38fd63c1ca5d1d6510724091494c85
openjdk7u141-b02.tar.xz.sig

Changes since u151-b01:
  - S6475361: Attempting to remove help menu from java.awt.MenuBar
throws NullPointerException
  - S6637288: Add OCSP support to PKIX CertPathBuilder implementation
  - S6854712: Revocation checking enhancements (JEP-124)
  - S6904367: (coll) IdentityHashMap is resized before exceeding the
expected maximum size
  - S7015157: String "Tabular Navigation" should be rephrased for
avoiding mistranslation
  - S7115744: Do not call File::deleteOnExit in security tests
  - S7126011: ReverseBuilder.getMatchingCACerts may throws NPE
  - S7147336: clarification on warning of keytool -printcrl
  - S7162687: enhance KDC server availability detection
  - S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not
determine revocation status)
  - S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest
fails with NullPointerException
  - S7196382: PKCS11 provider should support 2048-bit DH
  - S7197672: There are issues with shared data on windows
  - S7199939: DSA 576 and 640 bit keys fail when initializing for No
precomputed parameters
  - S8002074: Support for AES on SPARC
  - S8005408: KeyStore API enhancements
  - S8006863: javadoc cleanup for 8005408
  - S8006946: PKCS12 test failure due to incorrect alias name
  - S8006951: Avoid storing duplicate PKCS12 attributes
  - S8006994: Cleanup PKCS12 tests to ensure streams get closed
  - S8007483: attributes are ignored when loading keys from a PKCS12 keystore
  - S8007967: Infinite loop can happen in
sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward()
  - S8010112: NullPointerException in sun.security.provider.certpath.CertId()
  - S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769)
  - S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set
  - S8016252: More defensive HashSet.readObject
  - S8025215: jdk8 l10n resource file translation update 4
  - S8026943: SQE test jce/Global/Cipher/SameBuffer failed
  - S8027575: b113 causing a lot of memory allocation and regression
for wls_webapp_atomics
  - S8029659: Keytool, print key algorithm of certificate or key entry
  - S8029788: Certificate validation - java.lang.ClassCastException
  - S8031825: OCSP client can't find responder cert if it uses a
different subject key id algorithm than responderID
  - S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC
  - S8035623: [parfait] JNI exception pending in
jdk/src/windows/native/sun/windows/awt_Font.cpp
  - S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax
  - S8049312: AES/CICO test failed with on several modes
  - S8050374: More Signature tests
  - S8057810: New defaults for DSA keys in jarsigner and keytool
  - S8062552: Support keystore type detection for JKS and PKCS12 keystores
  - S8068427: Hashtable deserialization reconstitutes table with wrong capacity
  - S8068881: SIGBUS in C2 compiled method
weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions.<init>
  - S8075484: SocketInputStream.socketRead0 can hang even with soTimeout set
  - S8077670: sun/security/krb5/auto/MaxRetries.java may fail with BindException
  - S8078331: Upgrade JDK to use LittleCMS 2.7
  - S8079129: NullPointerException in PKCS#12 Keystore in PKCS12KeyStore.java
  - S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry
count is -1 less
  - S8136534: Loading JKS keystore using non-null InputStream results
in closed stream
  - S8149411: PKCS12KeyStore cannot extract AES Secret Keys
  - S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout
  - S8157561: Ship the unlimited policy files in JDK Updates
  - S8158517: Minor optimizations to ISO10126PADDING
  - S8164846: CertificateException missing cause of underlying exception
  - S8165543: Better window framing
  - S8165751: NPE hit with java.security.debug=provider
  - S8169026: Handle smartcard clean up better
  - S8169966: Larger AWT menus
  - S8170218: Improved Font Metrics
  - S8171252: Improve exception checking
  - S8171261: Stability fixes for lcms
  - S8171319: keytool should print out warnings when reading or
generating cert/cert req using weak algorithms
  - S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter
  - S8174109: Better queuing priorities
  - S8174966: Unreferenced references
  - S8175940: More certificate subject checking
  - S8176536: Improved algorithm constraints checking
  - S8176751: Better URL connections
  - S8177569: keytool should not warn if signature algorithm used in
cacerts is weak
  - S8178714: PKIX validator nameConstraints check failing after change 8175940
  - S8178794: Correct Kerberos ticket grants
  - S8179084: HotSpot VM fails to start when AggressiveHeap is set
  - S8179101: Improve algorithm constraints implementation
  - S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05
  - S8179564: Missing @bug for tests added with JDK-8165367
  - S8179998: Clear certificate chain connections
  - S8180024: Improve construction of objects during deserialization
  - S8180711: Better invokespecial checks
  - S8181048: Refactor existing providers to refer to the same
constants for default values for key length
  - S8181100: Better Base Exceptions
  - S8181323: Better timezone processing
  - S8181327: Better X processing
  - S8181370: Better keystore handling
  - S8181432: Better processing of unresolved permissions
  - S8181597: Process Proxy presentation
  - S8181612: More stable connection processing
  - S8181692: Update storage implementations
  - S8182879: Add warnings to keytool when using JKS and JCEKS
  - S8183028: Improve CMS header processing
  - S8184673: Fix compatibility issue in AlgorithmChecker for 3rd
party JCE providers
  - S8184682: Upgrade compression library
  - S8184937: LCMS error 13: Couldn't link the profiles
  - S8185039: Incorrect GPL header causes RE script to miss swap to
commercial header for licensee source bundle
  - S8185040: Incorrect GPL header causes RE script to miss swap to
commercial header for licensee source bundle
  - S8185778: 8u151 L10n resource file update
  - S8185845: Add SecurityTools.java test library
  - S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed
after backport to JDK 6/7/8
  - S8186533: 8u151 L10n resource file update md20
  - S8191137: keytool fails to format resource strings for keys for
some languages after JDK-8171319
  - S8191840: Update localizations with positional arguments following
JDK-8191137
  - S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test

As before, the IcedTea release notes (http://bitly.com/it20612) are a
useful aid in understanding the relevance of each change, and notably,
which are security fixes.

Note that 8176536: Improved algorithm constraints checking and
its dependants, 8179101 & 8179998, were included in this release
after being postponed from the July 2017 u151 release.

Webrevs for the new changes:

http://cr.openjdk.java.net/~andrew/openjdk7/20171017//root/
http://cr.openjdk.java.net/~andrew/openjdk7/20171017/corba/
http://cr.openjdk.java.net/~andrew/openjdk7/20171017/jaxp/
http://cr.openjdk.java.net/~andrew/openjdk7/20171017/jaxws/
http://cr.openjdk.java.net/~andrew/openjdk7/20171017/hotspot/
http://cr.openjdk.java.net/~andrew/openjdk7/20171017/jdk/
http://cr.openjdk.java.net/~andrew/openjdk7/20171017/langtools/

Ok to push?

Thanks,
-- 
Andrew :)

Senior Free Java Software Engineer
Red Hat, Inc. (http://www.redhat.com)

Web Site: http://fuseyism.com
Twitter: https://twitter.com/gnu_andrew_java
PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net)
Fingerprint = 5132 579D D154 0ED2 3E04  C5A0 CFDA 0F9B 3596 4222


More information about the jdk7u-dev mailing list