SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for java-1_4_2-ibm-1.4.2_sr13.3-1.1.x86_64.rpm :
Tue Dec 29 13:00:00 2009 mvyskocilAATTsuse.cz
- fixed [bnc#561831] - VUL-0: java 1.4.2 IBM 13 fp3 released

Mon Dec 7 13:00:00 2009 mvyskocilAATTsuse.cz
- timezone 1.6.9s update (bnc#558342)

Thu Nov 5 13:00:00 2009 mvyskocilAATTsuse.cz
- fixed [bnc#551829] - VUL-0: Update java-1_4_2-ibm to SR13 FP2

Wed Sep 23 14:00:00 2009 mvyskocilAATTsuse.cz
- fixed [bnc#540945] - VUL-0: Update java-1_4_2-ibm to SR13 FP1
- more ugly hacks to circumvent debuginfo scripts (for bnc#538528)
- disabled jar indexing to prevent their modifications

Fri Apr 3 14:00:00 2009 mvyskocilAATTsuse.cz
- fixed [bnc#489052]: IBM Java 1.4.2 SR13
updated to SR13

Fri Jan 16 13:00:00 2009 mvyskocilAATTsuse.cz
- use a %%{javaver} in a top dir (bnc#466078)
- move vendor opt flag to jre package
- use fdupes

Wed Jan 7 13:00:00 2009 mvyskocilAATTsuse.cz
- added a new timezone update tool jtzu-1.6.8i
- fixed bnc#456140

Tue Dec 16 13:00:00 2008 mvyskocilAATTsuse.cz
- fixed a version number [bnc#456749]

Mon Nov 24 13:00:00 2008 mvyskocilAATTsuse.cz
- fixed [bnc#436868] - VUL-0: ibm java 1.4.2 SR12 available
update to SR12
- also FATE#305091, bnc#417526
- CVE-2008-3104: Security vulnerabilities in the Java Runtime Environment may
allow an untrusted applet that is loaded from a remote system to circumvent
network access restrictions and establish socket connections to certain
services running on the local host, as if it were loaded from the system that
the applet is running on. This may allow the untrusted remote applet the
ability to exploit any security vulnerabilities existing in the services it
has connected to.
- CVE-2008-3112: A vulnerability in Java Web Start may allow an untrusted Java
Web Start application downloaded from a website to create arbitrary files
with the permissions of the user running the untrusted Java Web Start
application.
- CVE-2008-3113: A vulnerability in Java Web Start may allow an untrusted Java
Web Start application downloaded from a website to create or delete arbitrary
files with the permissions of the user running the untrusted Java Web Start
application.
- CVE-2008-3114: A vulnerability in Java Web Start may allow an untrusted Java
Web Start application to determine the location of the Java Web Start cache.
- j9jextract tool is not longer available on i386
see https://bugzilla.novell.com/show_bug.cgi?id=437213#c4
- added a rpmlintrc file and do not remove a build root in install section

Fri Oct 24 14:00:00 2008 kukukAATTsuse.de
- Replace compat-libstdc++ with libstdc++33

Tue Oct 14 14:00:00 2008 mvyskocilAATTsuse.cz
- prevent of: bnc#432772: /usr/bin/java is not executable
- use a `install -m 0755\' instead of `cp\' for wrapper-script installation

Wed Oct 1 14:00:00 2008 anosekAATTsuse.cz
- updated timezone data to 1.6.8f (bnc#427617)

Thu Sep 18 14:00:00 2008 mvyskocilAATTsuse.cz
- fix for [bnc#394974]: Missing .systemPrefs
- corrected compat symlink [bnc#404965]

Tue Jul 22 14:00:00 2008 anosekAATTsuse.cz
- put fixed tarball IBMJava2-SDK-AMD64-1.4.2-11.0.x86_64.tar.bz2
from upstream

Thu Jul 10 14:00:00 2008 anosekAATTsuse.cz
- fixed build (installed but unpackaged file)

Tue Jul 1 14:00:00 2008 anosekAATTsuse.cz
- updated to 1.4.2 sr11 (bnc#404983)
- updated timezone data (bnc#397378)

Tue May 20 14:00:00 2008 mvyskocilAATTsuse.cz
- a compat symlink to fix a compatibility with vendor package

Tue Apr 15 14:00:00 2008 mvyskocilAATTsuse.cz
- update to 1.4.2 sr10: VUL-0: IBM Java: multiple vulnerabilities [bnc#379038]
- CVE-2008-1196: A buffer overflow vulnerability in Java Web Start may allow an
untrusted Java Web Start application that is downloaded from a website to
elevate its privileges. For example, an untrusted Java Web Start application
may grant itself permissions to read and write local files or execute local
applications that are accessible to the user running the untrusted
application.
- CVE-2008-1195: A vulnerability in the Java Runtime Environment may allow
JavaScript(TM) code that is downloaded by a browser to make connections to
network services on the system that the browser runs on, through Java APIs,
This may allow files (that are accessible through these network services) or
vulnerabilities (that exist on these network services) which are not
otherwise normally accessible to be accessed or exploited.
- CVE-2008-1192: A vulnerability in the Java Plug-in may an untrusted applet to
bypass same origin policy and leverage this flaw to execute local
applications that are accessible to the user running the untrusted applet.
- CVE-2008-1190: A vulnerability in Java Web Start may allow an untrusted Java
Web Start application to elevate its privileges. For example, an application
may grant itself permissions to read and write local files or execute local
applications that are accessible to the user running the untrusted
application.
- CVE-2008-1189: A buffer overflow vulnerability in the Java Runtime
Environment may allow an untrusted applet or application to elevate its
privileges. For example, an applet may grant itself permissions to read and
write local files or execute local applications that are accessible to the
user running the untrusted applet.
- CVE-2008-1187: A vulnerability in the Java Runtime Environment with parsing
XML data may allow an untrusted applet or application to elevate its
privileges. For example, an applet may read certain URL resources (such as
some files and web pages).
- CVE-2007-5232: A vulnerability in the Java Runtime Environment (JRE) with
applet caching may allow an untrusted applet that is downloaded from a
malicious website to make network connections to network services on machines
other than the one that the applet was downloaded from. This may allow
network resources (such as web pages) and vulnerabilities (that exist on
these network services) which are not otherwise normally accessible to be
accessed or exploited.
- CVE-2007-5274: A vulnerability in the Java Runtime Environment (JRE) may
allow malicious Javascript code that is downloaded by a browser from a
malicious website to make network connections, through Java APIs, to network
services on machines other than the one that the Javascript code was
downloaded from. This may allow network resources (such as web pages) and
vulnerabilities (that exist on these network services) which are not
otherwise normally accessible to be accessed or exploited.
- CVE-2007-5273: A second vulnerability in the JRE may allow an untrusted
applet that is downloaded from a malicious website through a web proxy to
make network connections to network services on machines other than the one
that the applet was downloaded from. This may allow network resources (such
as web pages) and vulnerabilities (that exist on these network services)
which are not otherwise normally accessible to be accessed or exploited.
- CVE-2007-5236: An untrusted Java Web Start application may write arbitrary
files with the privileges of the user running the application.
- CVE-2007-5238: Three separate vulnerabilities may allow an untrusted Java Web
Start application to determine the location of the Java Web Start cache.
- CVE-2007-5239: An untrusted Java Web Start application or Java applet may
move or copy arbitrary files by requesting the user of the application or
applet to drag and drop a file from the Java Web Start application or Java
applet window.
- CVE-2007-5240: An untrusted applet may display an over-sized window so that
the applet warning banner is not visible to the user running the untrusted
applet.
- CVE-2007-4381: A vulnerability in the font parsing code in the Java Runtime
Environment may allow an untrusted applet to elevate its privileges. For
example, an applet may grant itself permissions to read and write local files
or execute local applications that are accessible to the user running the
untrusted applet.
- CVE-2007-3698: The Java Secure Socket Extension (JSSE) that is included in
various releases of the Java Runtime Environment does not correctly process
SSL/TLS handshake requests. This vulnerability may be exploited to create a
Denial of Service (DoS) condition to the system as a whole on a server that
listens for SSL/TLS connections using JSSE for SSL/TLS support.

Thu Oct 11 14:00:00 2007 anosekAATTsuse.cz
- fixed VUL-0: jdk from IBM fixes security bugs [#303898]

* updated to 1.4.2 sr9

* fixing: CVE-2007-2788 CVE-2007-2789 CVE-2007-3004 CVE-2007-3005
CVE-2007-3655 CVE-2007-3922

Thu Sep 6 14:00:00 2007 anosekAATTsuse.cz
- added 32-bit and 64-bit specific provides

Thu Jul 19 14:00:00 2007 stbinnerAATTsuse.de
- fix suse_update_desktop_file call

Tue Jul 3 14:00:00 2007 dbornkesselAATTsuse.de
- update to 1.4.2 sr 8 (Bug #271326 / Bug #284423)
... fixes the following bugs:
- DST bug in latest jdk releases when using EST MST and HST
- dg traces are turned off on OutOfMemory
- Bytecode/Qaud Classflow incorrectly removes NULLCHECK & INSTANC
- OOM due to unnecessary object retention in Deflater
- Callbacks do not work if Client connections from VPN Connection
- Retries happening on NO_PERMISSION causing user to be blocked
- NPE in ClientDelegate.servant_preinvoke()
- Object with too many fields causes heap corruption
- Incorrect behaviour of finally block when compiled with Jikes
- AIXSVT: regression: Double Allocation Failure
- JNI crash when trying to set the integer field of socket FD.
- Jarsigner throws a error message while verifying signed Jar fil
- High heap usage with javac because of ambiguity errors
- -showversion not recognised in IBM_JAVA_OPTIONS
- -showversion not recognised in IBM_JAVA_OPTIONS
- Allow customizable KeepAlive enablement in server
- In-Connection FVD Callback with Security
- WAS JNIReader Thread hung due to network outage
- DATA_CONVERSION errror whn EJB name has bidi characters
- NullPointerException in Connection.cleanUp()
- Marshal Exception while invoking a method on colocated EJB
- Problem with spilling of long variables on 32 bit architecture
- Incorrect resolution of forname in JIT
- Crash in FT when Native SOF
- Provide support for Sun system properties
- File descriptor leak because of improper finalization
- crash while draining the packets
- Crash due to bad branch target
- crash while draining the packets
- Crash due to bad branch target
- NCCB malloc failure.
- mod should be used instead of remainder in RSA
- Bad result from Long sub with both srcs same causes AIOOB
- Make the COMPACT_FRAGMENTED2 as last resort
- Crash when processing MSO
- GC start time in verbosegc prints wrong
- Copy propagation : Incorrect result do to bad JIT optimization.
- Incorrect Peephole opt results in register corruption
- crash in libnet.so in function jni_GetIntField
- Tune fix 109973 for all the linux platforms
- crash in libnet.so in function jni_GetIntField
- Crash due to r10 not holding EE when executing exception stubs
- Allow for message expansion in ClientRequestImpl.reInvoke()
- Crash is happeining in mmisInvoker_IIO_VHelper call.
- AdapterNonExistent Exceptions caused by POA long names
- Chinese (traditional) chars are corrupted
-
*Linear Scan
*Incorrect Unspill of src:crash in Compiled Code
- Large Sized Work buffer usage by JIT
- IBMCharsets.java not thread safe
-
*RAS
* Fix tracepoint in jvmdi_Allocate
- Remove stale references
- verbosegc logs gets overwritten
- Old NIO hang with client auth want and client has no cert

Tue May 29 14:00:00 2007 dbornkesselAATTsuse.de
- added ia64 macros

Fri May 25 14:00:00 2007 dbornkesselAATTsuse.de
- moved demo files to %{_jvmdir}/%{sdkdir}/demo (which is in %{_libdir}) in order to avoid having
*.so file in /usr/share
- switched on stripping again
- removed versionless provide of j2sdk
- hardlink duplicates
- index jar files

Fri May 4 14:00:00 2007 dbornkesselAATTsuse.de
- added unzip to BuildRequires

Sun Feb 11 13:00:00 2007 roAATTsuse.de
- moved defattr lines around to fix build as non-root

Thu Feb 1 13:00:00 2007 dbornkesselAATTsuse.de
- deleted jdbc\'s unversioned self-provide.

Thu Dec 21 13:00:00 2006 dbornkesselAATTsuse.de
- update to 1.4.2 sr7 (Feature request #301576)

Fri Nov 10 13:00:00 2006 roAATTsuse.de
- fix docu permissions

Thu Oct 26 14:00:00 2006 dbornkesselAATTsuse.de
- update to 1.4.2 sr6 (feature#301576)

Tue Sep 19 14:00:00 2006 dbornkesselAATTsuse.de
- update to 1.4.2 sr5
- naming scheme according to ibm naming

Wed Aug 16 14:00:00 2006 sndirschAATTsuse.de
- font.properties.SuSE.tar.gz:

* added /usr/share/fonts/truetype to appendedfontpath in
font.properties.{zh_CN,zh_HK,zh_TW}.SuSE; not sure if this
helps since I think that font.properties.{zh_CN,zh_HK,zh_TW} is
read instead; therefore question remains who is responsible to
copy .{zh_CN,zh_HK,zh_TW}.SuSE to .{zh_CN,zh_HK,zh_TW} (maybe
fonts-config?)

Wed Jul 26 14:00:00 2006 dbornkesselAATTsuse.de
- patch for jni.h (Bug 194790)


 
ICM