Name : java-1.7.0-openjdk Product : Fedora 16 Version : 1.7.0.1 Release : 2.0.3.fc16 URL : http://openjdk.java.net/ Summary : OpenJDK Runtime Environment Description : The OpenJDK runtime environment.
------------------------------------------------------------------------------- - Update Information:
This new update enables dynamic linking of libjpeg, libgif, libpng, etc. Fixed in this update:
- Added patch to fix bug in jdk_generic_profile.sh
- Compile with generic profile to use system libraries
- Made remove-intree-libraries.sh more robust
- Added lcms requirement
- Added patch to fix glibc name clash
- Updated java version to include -icedtea ------------------------------------------------------------------------------- - ChangeLog:
* Tue Nov 15 2011 Deepak Bhole <dbhole@redhat.com> - 1.7.0.1-2.0.3 - Added patch to fix bug in jdk_generic_profile.sh - Compile with generic profile to use system libraries - Made remove-intree-libraries.sh more robust - Added lcms requirement - Added patch to fix glibc name clash - Updated java version to include -icedtea * Sun Nov 6 2011 Deepak Bhole <dbhole@redhat.com> - 1.7.0.1-2.0.2 - Added missing changelog entry * Sun Nov 6 2011 Deepak Bhole <dbhole@redhat.com> - 1.7.0.1-2.0.1 - Updated to IcedTea 2.0 tag in the IcedTea OpenJDK7 forest - Removed obsoleted patches - Added system timezone support - Revamp version/release naming scheme to make it proper - Security fixes - S7000600, CVE-2011-3547: InputStream skip() information leak - S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor - S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow - S7032417, CVE-2011-3552: excessive default UDP socket limit under SecurityManager - S7046823, CVE-2011-3544: missing SecurityManager checks in scripting engine - S7055902, CVE-2011-3521: IIOP deserialization code execution - S7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress error checks - S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) - S7070134, CVE-2011-3558: HotSpot crashes with sigsegv from PorterStemmer - S7077466, CVE-2011-3556: RMI DGC server remote code execution - S7083012, CVE-2011-3557: RMI registry privileged code execution - S7096936, CVE-2011-3560: missing checkSetFactory calls in HttpsURLConnection ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update java-1.7.0-openjdk' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|