618
|
|
|
Matthias Klose |
7 years ago
|
 |
|
617
|
|
|
Matthias Klose |
7 years ago
|
 |
|
616
|
|
|
Matthias Klose |
7 years ago
|
 |
|
615
|
|
|
Matthias Klose |
7 years ago
|
 |
|
614
|
|
|
Matthias Klose |
7 years ago
|
 |
|
613
|
|
|
Matthias Klose |
7 years ago
|
 |
|
612
|
|
|
Matthias Klose |
8 years ago
|
 |
|
611
|
|
|
Matthias Klose |
8 years ago
|
 |
|
610
|
|
openjdk-7 (7u121-2.6.8-2) experimental; urgency=high
[ Tiago Stürmer Daitx ] * Security fixes from 8u121: - S8167104, CVE-2017-3289: Custom class constructor code can bypass the required call to super.init allowing for uninitialized objects to be created. - S8164143, CVE-2017-3260: It is possible to corrupt memory by calling dispose() on a CMenuComponentmultiple times. - S8168714, CVE-2016-5546: ECDSA will accept signatures that have various extraneous bytes added to them whereas the signature is supposed to be unique. - S8166988, CVE-2017-3253: The PNG specification allows the [iz}Txt sections to be 2^32-1 bytes long so these should not be uncompressed unless the user explicitly requests it. - S8168728, CVE-2016-5548: DSA signing exhibits a timing bias that may leak information about k. - S8161743, CVE-2017-3252: LdapLoginModule incorrectly tries to deserialize responses from an LDAP server when an LDAP context is expected. - S8167223, CVE-2016-5552: Parsing of URLs can be inconsistent with how users or external applications would interpret them leading to possible security issues. - S8168705, CVE-2016-5547: A value from an InputStream is read directly into the size argument of a new byte[] without validation. - S8164147, CVE-2017-3261: An integer overflow exists in SocketOutputStream which can lead to memorydisclosure. - S8151934, CVE-2017-3231: Under some circumstances URLClassLoader will dispatch HTTP GET requests where the invoker does not have permission. - S8165071, CVE-2016-2183: 3DES can be exploited for block collisions when long running sessions are allowed. * Missing - S8165344, CVE-2017-3272: A protected field can be leveraged into type confusion. - S8156802, CVE-2017-3241: RMI deserialization should limit the types deserialized to prevent attacks that could escape the sandbox. * Ignored - S8168724, CVE-2016-5549: ECDSA signing exhibits a timing bias that may leak information about k.
-- Matthias Klose <doko@ubuntu.com> Tue, 07 Feb 2017 11:09:39 +0100
|
Matthias Klose |
8 years ago
|
 |
|
609
|
|
|
Matthias Klose |
8 years ago
|
 |
|
608
|
|
|
Matthias Klose |
8 years ago
|
 |
|
607
|
|
|
Matthias Klose |
8 years ago
|
 |
|
606
|
|
|
Matthias Klose |
8 years ago
|
 |
|
605
|
|
|
Matthias Klose |
8 years ago
|
 |
|
604
|
|
|
Matthias Klose |
8 years ago
|
 |
|
603
|
|
|
Matthias Klose |
8 years ago
|
 |
|
602
|
|
openjdk-7 (7u95-2.6.4-3) experimental; urgency=medium
[ Tiago Stürmer Daitx ] * SECURITY UPDATE: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. - d/p/jdk-8152335-improve-methodhandle-consistency.patch: S8152335, CVE-2016-0636: Improve MethodHandle consistency
[ Matthias Klose ] * Use internal tzdata for builds in stretch, unstable, experimental. Closes: #818308.
-- Matthias Klose <doko@ubuntu.com> Thu, 24 Mar 2016 15:24:32 +0100
openjdk-7 (7u95-2.6.4-2) experimental; urgency=medium
* Upload to experimental.
-- Matthias Klose <doko@ubuntu.com> Fri, 05 Feb 2016 17:51:20 +0100
openjdk-7 (7u95-2.6.4-1) unstable; urgency=high
[ Tiago Stürmer Daitx ] * IcedTea release 2.6.4 (based on 7u95): * Security fixes - S8059054, CVE-2016-0402: Better URL processing - S8130710, CVE-2016-0448: Better attributes processing - S8132210: Reinforce JMX collector internals - S8132988: Better printing dialogues - S8133962, CVE-2016-0466: More general limits - S8137060: JMX memory management improvements - S8139012: Better font substitutions - S8139017, CVE-2016-0483: More stable image decoding - S8140543, CVE-2016-0494: Arrange font actions - S8143185: Cleanup for handling proxies - S8143941, CVE-2015-8126, CVE-2015-8472: Update splashscreen displays - S8144773, CVE-2015-7575: Further reduce use of MD5 (SLOTH) * debian/patches/it-debian-build-flags.diff: refreshed * debian/patches/it-set-compiler.diff: refreshed * debian/patches/it-use-quilt.diff: refreshed * debian/patches/it-jamvm-2.0.diff: refreshed * debian/patches/icedtea-pretend-memory.diff: refreshed * debian/patches/fix_extra_flags-default.diff: refreshed * debian/patches/zero-sparc.diff: refreshed
[ Matthias Klose ] * Remove obsolete IcedTea configure options. * Fix build failure on squeeze (Thorsten Glaser). Closes: #809205. * Don't run the test on mips, still having stone age buildd hardware and empty promises to fix these issues since 2010.
-- Matthias Klose <doko@ubuntu.com> Thu, 21 Jan 2016 13:17:54 +0100
|
Matthias Klose |
8 years ago
|
 |
|
601
|
|
|
Matthias Klose |
9 years ago
|
 |
|
600
|
|
|
Matthias Klose |
9 years ago
|
 |
|
599
|
|
|
Matthias Klose |
9 years ago
|
 |
|