Age | Commit message (Collapse) | Author | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
than 1hr of CPU time.
|
|
Security fixes for:
CVE-2020-2754, CVE-2020-2755, CVE-2020-2756, CVE-2020-2757, CVE-2020-2773,
CVE-2020-2781, CVE-2020-2800, CVE-2020-2803, CVE-2020-2805, CVE-2020-2830
Also misc bugfixes.
|
|
|
|
|
|
|
|
recursive bump for the dependency change
|
|
Requested by Matthias Ferdinand and Oskar on pkgsrc-users.
|
|
BSD specific fixes:
- Fix BsdNativeDispatcher
- Support thread name setting on OpenBSD and NetBSD
Security fixes:
- S8225261: Better method resolutions
- S8224909, CVE-2020-2583: Unlink Set of LinkedHashSets
- S8225279: Better XRender interpolation
- S8226352, CVE-2020-2590: Improve Kerberos interop capabilities
- S8227758: More valid PKIX processing
- S8227816: More Colorful ICC profiles
- S8228548, CVE-2020-2593: Normalize normalization for all
- S8229951, CVE-2020-2601: Better Ticket Granting Services
- S8230279: Improve Pack200 file reading
- S8230318: Better trust store usage
- S8230967: Improve Registry support of clients
- S8231129: More glyph images
- S8231139: Improved keystore support
- S8231422, CVE-2020-2604: Better serial filter handling
- S8231795, CVE-2020-2659: Enhance datagram socket support
- S8232419: Improve Registry registration
- S8234037, CVE-2020-2654: Improve Object Identifier Processing
~100 additional minor bugfixes.
|
|
found and provided by Mike Pumfold
|
|
pkglint -r --network --only "migrate"
As a side-effect of migrating the homepages, pkglint also fixed a few
indentations in unrelated lines. These and the new homepages have been
checked manually.
|
|
|
|
pkglint -Wall -F --only aligned --only indent -r
No manual corrections.
|
|
Bug fix and security update. Resolves in particular the following CVEs:
- S8213429, CVE-2019-2933: Windows file handling redux
- S8218573, CVE-2019-2945: Better socket support
- S8220302, CVE-2019-2949: Better Kerberos ccache handling
- S8221858, CVE-2019-2958: Build Better Processes
- S8222684, CVE-2019-2964: Better support for patterns
- S8222690, CVE-2019-2962: Better Glyph Images
- S8223505, CVE-2019-2973: Better pattern compilation
- S8223518, CVE-2019-2975: Unexpected exception in jjs
- S8223892, CVE-2019-2978: Improved handling of jar files
- S8224532, CVE-2019-2981: Better Path supports
- S8224915, CVE-2019-2983: Better serial attributes
- S8225286, CVE-2019-2987: Better rendering of native glyphs
- S8225292, CVE-2019-2988: Better Graphics2D drawing
- S8225298, CVE-2019-2989: Improve TLS connection support
- S8225597, CVE-2019-2992: Enhance font glyph mapping
- S8226765, CVE-2019-2999: Commentary on Javadoc comments
- S8228825, CVE-2019-2894: Enhance ECDSA operations
|
|
|
|
Also drop support for NetBSD 6 and older.
|
|
|
|
|
|
|
|
So the bootstrap kits can be found. Oops.
|
|
|
|
|
|
This repo is a continuation of the bsd-port tree, still maintained by
the FreeBSD ports java people.
It is forked from (and merges regularly from) AdoptOpenJDK.
They accept patches for other BSDs, so we should see if we have anything
in our tree worth contributing.
As a side effect, this changes updates openjdk8 to u222.
|
|
|
|
|
|
|
|
|
|
pkglint -Wall -r --only "substitution command" -F
With manual review and indentation fixes since pkglint doesn't get that
part correct in every case.
|
|
Remove libXp build dependency, not used.
|
|
|
|
|
|
* Fix sigaction usage for NetBSD, from nonaka@. Thank you.
Changelog:
Bugfixes:
JDK-8210384
JDK-8191178
JDK-8130655
JDK-8205479
JDK-8170937
JDK-8207322
JDK-8201801
JDK-8182461
JDK-8207150
JDK-8202264
JDK-8206392
JDK-8208638
JDK-8207060
JDK-8207750
JDK-8200719
JDK-8202261
JDK-8207145
JDK-8165852
JDK-8139507
JDK-8209184
JDK-8210038
JDK-8208183
JDK-8212709
JDK-8164920
JDK-8209639
JDK-8172850
JDK-8155635
JDK-8131048
JDK-8211150
JDK-8064811
JDK-8211909
JDK-8211387
JDK-8211124
JDK-8205965
JDK-8196882
JDK-8209863
JDK-8211394
JDK-8145788
JDK-8208091
JDK-8164383
JDK-8210219
JDK-8148129
JDK-8209457
JDK-8202277
JDK-8196968
JDK-8207159
JDK-8212147
JDK-8156709
JDK-8187218
JDK-8131051
JDK-8160928
See:
https://www.oracle.com/technetwork/java/javase/8u202-relnotes-5209339.html
|
|
|
|
|
|
Changelog:
New Features
security-libs/javax.net.ssl
➜ Support for Customization of Default Enabled Cipher Suites via System Properties
The system property jdk.tls.client.cipherSuites can be used to customize the default enabled cipher suites for the client side of SSL/TLS connections. In a similar way, the system property jdk.tls.server.cipherSuites can be used for customization on the server side.
The system properties contain a comma-separated list of supported cipher suite names that specify the default enabled cipher suites. All other supported cipher suites are disabled for this default setting. Unrecognized or unsupported cipher suite names specified in properties are ignored. Explicit setting of enabled cipher suites will override the system properties.
Please refer to the "Java Cryptography Architecture Standard Algorithm Name Documentation" for the standard JSSE cipher suite names, and the "Java Cryptography Architecture Oracle Providers Documentation" for the cipher suite names supported by the SunJSSE provider.
Note that the actual use of enabled cipher suites is restricted by algorithm constraints.
Note also that these system properties are currently supported by the JDK Reference Implementation. They are not guaranteed to be supported by other implementations.
Warning: These system properties can be used to configure weak cipher suites, or the configured cipher suites may become more weak over time. We do not recommend using the system properties unless you understand the security implications. Use them at your own risk.
See JDK-8162362
Bug Fixes
This release contains fixes for security vulnerabilities described in the Oracle Critical Patch Update. For a more complete list of the bug fixes included in this release, see the JDK 8u192 Bug Fixes page.
Security bugs:
CVE-2018-3183
CVE-2018-3209
CVE-2018-3169
CVE-2018-3149
CVE-2018-3211
CVE-2018-3180
CVE-2018-3214
CVE-2018-3157
CVE-2018-3150
CVE-2018-13785
CVE-2018-3136
CVE-2018-3139
|
|
|
|
|
|
|
|
|
|
There is some compatibility issue with the current version of jdk7.
|
|
From Marc Baudoin. Thank you.
|
|
Changelog:
Fixed:
CVE-2018-2938
CVE-2018-2964
CVE-2018-2941
CVE-2018-2942
CVE-2018-2972
CVE-2018-2973
CVE-2018-2940
CVE-2018-2952
|