[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted openjdk-10 10.0.2+13-2 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 21 Oct 2018 12:11:46 +0200
Source: openjdk-10
Binary: openjdk-10-jdk-headless openjdk-10-jre-headless openjdk-10-jdk openjdk-10-jre openjdk-10-demo openjdk-10-source openjdk-10-doc openjdk-10-dbg openjdk-10-jre-zero
Architecture: source
Version: 10.0.2+13-2
Distribution: unstable
Urgency: high
Maintainer: OpenJDK Team <openjdk@lists.launchpad.net>
Changed-By: Matthias Klose <doko@ubuntu.com>
Description:
 openjdk-10-dbg - Java runtime based on OpenJDK (debugging symbols)
 openjdk-10-demo - Java runtime based on OpenJDK (demos and examples)
 openjdk-10-doc - OpenJDK Development Kit (JDK) documentation
 openjdk-10-jdk - OpenJDK Development Kit (JDK)
 openjdk-10-jdk-headless - OpenJDK Development Kit (JDK) (headless)
 openjdk-10-jre - OpenJDK Java runtime, using
 openjdk-10-jre-headless - OpenJDK Java runtime, using  (headless)
 openjdk-10-jre-zero - Alternative JVM for OpenJDK, using Zero
 openjdk-10-source - OpenJDK Development Kit (JDK) source files
Changes:
 openjdk-10 (10.0.2+13-2) unstable; urgency=high
 .
   [ Tiago Stürmer Daitx ]
   * Security update. Backport security patches from 11.0.1-b12.
     - CVE-2018-3136, S8194534: Manifest better support.
     - CVE-2018-3139, S8196902: Better HTTP Redirection.
     - CVE-2018-3150, S8199171, S8199172: Improve jar attribute checks.
     - CVE-2018-3149, S8199177: Enhance JNDI lookups.
     - CVE-2018-3169, S8199226: Improve field accesses.
     - CVE-2018-3180, S8202613: Improve TLS connections stability.
     - CVE-2018-3183, S8202936: Improve script engine support.
     - S8195868, S8199110: Address Internet Addresses.
     - S8195874: Improve jar specification adherence.
     - S8201756: Improve cipher inputs.
     - S8203654: Improve cypher state updates.
     - S8204497: Better formatting of decimals.
   * debian/patches/jdk-freetypeScaler-crash.diff: removed as this patch causes
     a memory leak - upstream fixed it in openjdk-7, albeit in a different way.
   * debian/rules: fix TIME definition.
 .
   [ Matthias Klose ]
   * Bump standards version.
Checksums-Sha1:
 ef0474b484768b8b6095080ce5a2bc4d0bd6d144 4518 openjdk-10_10.0.2+13-2.dsc
 63b4945ee725b1891303b00675c72d76ba42bb82 179896 openjdk-10_10.0.2+13-2.debian.tar.xz
 81d7541ec8db1654ca38e2c10ea54dbbf3d99b35 16138 openjdk-10_10.0.2+13-2_source.buildinfo
Checksums-Sha256:
 500e40578f2043723c426c1e0eb788a99e622227ed6edec1d3659285117c854f 4518 openjdk-10_10.0.2+13-2.dsc
 acf423fcc7a7bd9ff96bfe64cb9634b888fc1276c90131d31b8c164ca4b72c9a 179896 openjdk-10_10.0.2+13-2.debian.tar.xz
 2f0f9a850eff761c45bafa46f9a08c29afe93212d648e42a7554e754eef68d3f 16138 openjdk-10_10.0.2+13-2_source.buildinfo
Files:
 082909804a67384461d1758f0362ccdd 4518 java optional openjdk-10_10.0.2+13-2.dsc
 e23e7cbff8ea15a5a0cec82cfb484679 179896 java optional openjdk-10_10.0.2+13-2.debian.tar.xz
 1f0dd6de7df18a59a5220f2c127900a0 16138 java optional openjdk-10_10.0.2+13-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=eSLt
-----END PGP SIGNATURE-----


Reply to: