622
|
|
openjdk-7 (7u171-2.6.13-1) experimental; urgency=high
[ Tiago Stürmer Daitx ] * IcedTea release 2.6.13 (based on 7u171). Closes: #891330. * Security fixes: - S8160104: CORBA communication improvements - S8172525, CVE-2018-2579: Improve key keying case - S8174756: Extra validation for public keys - S8175932: Improve host instance supports - S8176458: Revise default document styling - S8178449, CVE-2018-2588: Improve LDAP logins - S8178458: Better use of certificates in LDAP - S8178466: Better RSA parameters - S8179536: Cleaner print job handling - S8179990: Cleaner palette entry handling - S8180011: Cleaner native graphics device handling - S8180015: Cleaner AWT robot handling - S8180020: Improve SymbolHashMap entry handling - S8180433: Cleaner CLR invocation handling - S8180877: More deeply colored ICC spaces - S8181664: Improve JVM UTF String handling - S8181670: Improve implementation of keystores - S8182125, CVE-2018-2599: Improve reliability of DNS lookups - S8182387, CVE-2018-2603: Improve PKCS usage - S8182601, CVE-2018-2602: Improve usage messages - S8185292, CVE-2018-2618: Stricter key generation - S8185325, CVE-2018-2641: Improve GTK initialization - S8186080: Transform XML interfaces - S8186212, CVE-2018-2629: Improve GSS handling - S8186600, CVE-2018-2634: Improve property negotiations - S8186606, CVE-2018-2633: Improve LDAP lookup robustness - S8186867: Improve native glyph layouts - S8186998, CVE-2018-2637: Improve JMX supportive features - S8189284, CVE-2018-2663: More refactoring for deserialization cases - S8190289, CVE-2018-2677: More refactoring for client deserialization cases - S8191142, CVE-2018-2678: More refactoring for naming deserialization cases * Remove multiarch-support pre-dependency. Closes: #887858.
[ Matthias Klose ] * Bump standards version. * Disable bootstrap on sid/buster, gcj is removed. * Remove Damien Raude-Morvan as uploader. Closes: #889378.
-- Matthias Klose <doko@ubuntu.com> Mon, 02 Apr 2018 10:36:32 +0200
|
Matthias Klose |
6 years ago
|
 |
|
621
|
|
|
Matthias Klose |
6 years ago
|
 |
|
620
|
|
|
Matthias Klose |
7 years ago
|
 |
|
619
|
|
|
Matthias Klose |
7 years ago
|
 |
|
618
|
|
|
Matthias Klose |
7 years ago
|
 |
|
617
|
|
|
Matthias Klose |
7 years ago
|
 |
|
616
|
|
|
Matthias Klose |
7 years ago
|
 |
|
615
|
|
|
Matthias Klose |
7 years ago
|
 |
|
614
|
|
|
Matthias Klose |
7 years ago
|
 |
|
613
|
|
|
Matthias Klose |
7 years ago
|
 |
|
612
|
|
|
Matthias Klose |
8 years ago
|
 |
|
611
|
|
|
Matthias Klose |
8 years ago
|
 |
|
610
|
|
openjdk-7 (7u121-2.6.8-2) experimental; urgency=high
[ Tiago Stürmer Daitx ] * Security fixes from 8u121: - S8167104, CVE-2017-3289: Custom class constructor code can bypass the required call to super.init allowing for uninitialized objects to be created. - S8164143, CVE-2017-3260: It is possible to corrupt memory by calling dispose() on a CMenuComponentmultiple times. - S8168714, CVE-2016-5546: ECDSA will accept signatures that have various extraneous bytes added to them whereas the signature is supposed to be unique. - S8166988, CVE-2017-3253: The PNG specification allows the [iz}Txt sections to be 2^32-1 bytes long so these should not be uncompressed unless the user explicitly requests it. - S8168728, CVE-2016-5548: DSA signing exhibits a timing bias that may leak information about k. - S8161743, CVE-2017-3252: LdapLoginModule incorrectly tries to deserialize responses from an LDAP server when an LDAP context is expected. - S8167223, CVE-2016-5552: Parsing of URLs can be inconsistent with how users or external applications would interpret them leading to possible security issues. - S8168705, CVE-2016-5547: A value from an InputStream is read directly into the size argument of a new byte[] without validation. - S8164147, CVE-2017-3261: An integer overflow exists in SocketOutputStream which can lead to memorydisclosure. - S8151934, CVE-2017-3231: Under some circumstances URLClassLoader will dispatch HTTP GET requests where the invoker does not have permission. - S8165071, CVE-2016-2183: 3DES can be exploited for block collisions when long running sessions are allowed. * Missing - S8165344, CVE-2017-3272: A protected field can be leveraged into type confusion. - S8156802, CVE-2017-3241: RMI deserialization should limit the types deserialized to prevent attacks that could escape the sandbox. * Ignored - S8168724, CVE-2016-5549: ECDSA signing exhibits a timing bias that may leak information about k.
-- Matthias Klose <doko@ubuntu.com> Tue, 07 Feb 2017 11:09:39 +0100
|
Matthias Klose |
8 years ago
|
 |
|
609
|
|
|
Matthias Klose |
8 years ago
|
 |
|
608
|
|
|
Matthias Klose |
8 years ago
|
 |
|
607
|
|
|
Matthias Klose |
8 years ago
|
 |
|
606
|
|
|
Matthias Klose |
8 years ago
|
 |
|
605
|
|
|
Matthias Klose |
8 years ago
|
 |
|
604
|
|
|
Matthias Klose |
8 years ago
|
 |
|
603
|
|
|
Matthias Klose |
8 years ago
|
 |
|