Hello community,
here is the log from the commit of package java-11-openjdk for openSUSE:Factory checked in at 2019-04-19 18:35:16
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/java-11-openjdk (Old)
and /work/SRC/openSUSE:Factory/.java-11-openjdk.new.5536 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "java-11-openjdk"
Fri Apr 19 18:35:16 2019 rev:29 rq:695034 version:11.0.3.0
Changes:
--------
--- /work/SRC/openSUSE:Factory/java-11-openjdk/java-11-openjdk.changes 2019-01-26 22:18:03.199067775 +0100
+++ /work/SRC/openSUSE:Factory/.java-11-openjdk.new.5536/java-11-openjdk.changes 2019-04-19 18:35:23.926957290 +0200
@@ -1,0 +2,218 @@
+Wed Apr 17 05:52:31 UTC 2019 - Fridrich Strba
+
+- Update to upstream tag jdk-11.0.3+7 (April 2019 CPU)
+ * Security fixes
+ + S8211936, CVE-2019-2602, bsc#1132728: Better String parsing
+ + S8214809: CDS storage improvements
+ + S8218453, CVE-2019-2684, bsc#1132732: More dynamic RMI
+ interactions
+ * Other changes
+ + S8034802: (zipfs) newFileSystem throws UOE when the zip file
+ is located in a custom file system
+ + S8165675: Trace event for thread park has incorrect unit for
+ timeout
+ + S8172695: (scanner) java/util/Scanner/ScanTest.java fails
+ + S8187364: Unable to enter zero width non-joiner (ZWNJ) symbol
+ in Swing text component
+ + S8197398: (zipfs) Files.walkFileTree walk indefinitelly while
+ processing JAR file with "/" as a directory inside.
+ + S8200109: NMT: diff_malloc_site assert(early->flags() ==
+ current->flags(), "Must be the same memory type")
+ + S8201818: [macosx] Printing attributes break page size set via
+ "java.awt.print.Book" object
+ + S8204142: AWT hang occurs when sequenced events arrive out of
+ sequence in multiple AppContexts
+ + S8205432: Replace the placeholder Japanese era name
+ + S8206120: Add test cases for lenient Japanese era parsing
+ + S8207070: Webstart app popup on wrong screen in a one-screen
+ setup changing to multi-monitor
+ + S8207258: Distrust TLS server certificates anchored by
+ Symantec Root CAs
+ + S8207760: SAXException: Invalid UTF-16 surrogate detected:
+ d83c ?
+ + S8207829: FlightRecorderMXBeanImpl is leaking the first
+ classloader which calls it
+ + S8207849: Allow the addition of more number to the Java
+ version string
+ + S8208275: C2 crash in Node::add_req(Node*)
+ + S8208656: Move java/util/Calendar/CalendarTestScripts tests
+ into OpenJDK
+ + S8209615: ParseError in XMLEventReader on a valid input
+ + S8209758: 2 classes with same name G1PrintCollectionSetClosure
+ cause crash when logging is enabled
+ + S8209960: -Xlog:jfr* doesn't work with the JFR
+ + S8210192: Hsperf counter ParNew::CMS should be ParNew:CMS
+ + S8210394: (zipfs) jdk/nio/zipfs/ZFSTests.java rootdir.zip: The
+ process cannot access the file because it is being used by
+ another process
+ + S8210633: Cannot parse JapaneseDate string with
+ DateTimeFormatterBuilder Mapped-values
+ + S8210874: Test for JDK-8209615
+ + S8210974: No extensions debug log for ClientHello
+ + S8210989: RSASSA-PSS certificate cannot be selected for client
+ auth on TLSv1.2
+ + S8211049: Second parameter of "initialize" method is not used
+ + S8211064: [AArch64] Interpreter and c1 don't correctly handle
+ jboolean results in native calls
+ + S8211100: hotspot C1 issue with comparing long numbers on x86
+ 32-bit
+ + S8211163: UNIX version of Java_java_io_Console_echo does not
+ return a clean boolean
+ + S8211267: StackOverflowError happened by
+ TextField.setFont(...)
+ + S8211295: DriverManager.getConnection fails when called from
+ com.sun.rowset.JdbcRowSetImpl
+ + S8211320: Aarch64: unsafe.compareAndSetByte() and
+ unsafe.compareAndSetShort() c2 intrinsics broken with negative
+ expected value
+ + S8211382: ISO2022JP and GB18030 NIO converter issues
+ + S8211398: Square character support for the Japanese new era
+ + S8211698: Crash in C2 compiled code during execution of double
+ array heavy processing code
+ + S8211765: JarFile constructor throws undocumented exception
+ + S8211787: javax/net/ssl/TLSCommon/TLSTest.java throws
+ java.net.SocketTimeoutException: Read timed out
+ + S8211821: PrintStringTableStatistics crashes JVM
+ + S8212173: Thread._stack_base/_stack_size initialized too late
+ for new threads
+ + S8212232: Wrong metadata for the configuration of the cutoff
+ for old object sample events
+ + S8212233: javadoc fails on jdk12 with "The code being
+ documented uses modules but the packages defined in $URL are
+ in the unnamed module."
+ + S8212885: TLS 1.3 resumed session does not retain peer
+ certificate chain
+ + S8212941: Support new Japanese era in
+ java.time.chrono.JapaneseEra
+ + S8213183: InputMethod cannot be used after its restarting
+ + S8213202: Possible race condition in TLS 1.3 session resumption
+ + S8213419: C2 may hang in MulLNode::Ideal()/MulINode::Ideal()
+ with gcc 8.2.1
+ + S8213421: Line number information for execution samples
+ always 0
+ + S8213583: Error while opening the JFileChooser when desktop
+ contains shortcuts pointing to deleted files
+ + S8213754: PPC64: Add Intrinsics for
+ isDigit/isLowerCase/isUpperCase/isWhitespace
+ + S8213782: NullPointerException in
+ sun.security.ssl.OutputRecord.changeWriteCiphers
+ + S8213829: Remove circular dependency between g1CollectedHeap
+ and g1ConcurrentMark
+ + S8213952: Relax DNSName restriction as per RFC 1123
+ + S8213966: The ZGC JFR events should be marked as experimental
+ + S8213983: [macosx] Keyboard shortcut ?cmd +`? stops working
+ properly if popup window is displayed
+ + S8214063: OpenJDK will not build on AIX while using the xlc
+ 13.1 compiler
+ + S8214100: use of keystore probing results in unnecessary
+ exception thrown
+ + S8214118: HeapRegions marked as archive even if CDS mapping
+ fails
+ + S8214122: JDWP is broken on 32 bit Windows: transport library
+ missing onLoad entry
+ + S8214129: SSL session resumption/SNI with TLS1.2 causes
+ StackOverflowError
+ + S8214189: test/hotspot/jtreg/compiler/intrinsics/mathexact/
+ /MulExactLConstantTest.java fails on Windows x64 when run with
+ -XX:-TieredCompilation
+ + S8214206: Fix for JDK-8213419 is broken on 32-bit
+ + S8214339: SSLSocketImpl erroneously wraps SocketException
+ + S8214352: C1: Unnecessary "compilation bailout: block join
+ failed" with JVMTI
+ + S8214451: PPC64/s390: Clean up unused CRC32 prototype and
+ function
+ + S8214513: A PKCS12 keystore from Java 8 using custom PBE
+ parameters cannot be read in Java 11
+ + S8214688: TLS 1.3 session resumption with hello retry request
+ failed with "illegal_parameter"
+ + S8214827: Incorrect call
+ ClassLoaders.toFileURL("jrt:/java.compiler")
+ + S8215100: AArch64: fix compareTo intrinsic with four-character
+ Latin/Unicode
+ + S8215175: Inconsistencies in JFR event metadata
+ + S8215202: AArch64: jtreg test
+ test/jdk/sun/nio/cs/FindEncoderBugs.java fails
+ + S8215317: [GRAAL] unit test CheckGraalIntrinsics failed after
+ 8213754
+ + S8215330: javax.xml.catalog.CatalogResolverImpl:
+ GroupEntry.matchURI fails to match
+ + S8215362: JFR GTest JfrTestNetworkUtilization fails
+ + S8215397: jsig.c missing classpath exception
+ + S8215727: Restore JFR thread sampler loop to old / previous
+ behavior
+ + S8215947: JVM crash with -XX:+DumpSharedSpaces
+ + S8215951: AArch64: jtreg test
+ vmTestbase/nsk/jvmti/PopFrame/popframe005 segfaults
+ + S8215962: Support ThreadPriorityPolicy mode 1 for non-root
+ users on linux/bsd
+ + S8216049: stringTable::intern creates redundant String when
+ looking up existing one
+ + S8216060: [PPC64] Vector CRC implementation should be used by
+ interpreter and be faster for short arrays
+ + S8216280: Allow later Symantec Policy distrust date for two
+ Apple SubCAs
+ + S8216302: StackTraceElement::fill_in can use cached Class.name
+ + S8216308: StackTraceElement::fill_in can use injected Class
+ source-file
+ + S8216350: AArch64: monitor unlock fast path not called
+ + S8216546: Support new Japanese era in java.lang.Character for
+ Java SE 11
+ + S8216578: Remove unused/obsolete method in JFR code
+ + S8216965: crash in freetypeScaler.c CopyBW2Grey8
+ + S8217014: Epsilon should not ignore Metadata GC causes
+ + S8217315: Proper units should print more significant digits
+ + S8217321: [TESTBUG] utilities/test_globalDefinitions.cpp
+ should use _LP64, not LP64
+ + S8217342: Build failed with excluding JFR
+ + S8217378: UseCriticalCMSThreadPriority is broken
+ + S8217427: (dc) nio/channels/DatagramChannel/UseDGWithIPv6.java
+ fails without IPv6
+ + S8217432: MetaspaceGC::_capacity_until_GC exceeds
+ MaxMetaspaceSize
+ + S8217459: [PPC64] Cleanup non-vector version of CRC32
+ + S8217471: [TESTBUG] gc/epsilon/TestClasses.java fails on some
+ platforms - OOME Metaspace
+ + S8217520: Remove vm.opt.MaxGCPauseMillis == "null" from
+ TestOldGenCollectionUsage.java
+ + S8217579: TLS_EMPTY_RENEGOTIATION_INFO_SCSV is disabled after
+ 8211883
+ + S8217597: [TESTBUG] old version docker does not support --cpus
+ + S8217609: New era placeholder not recognized by
+ java.text.SimpleDateFormat
+ + S8217628: Verbose ArrayIndexOutOfBoundsException message also
+ in JNI calls.
+ + S8217657: Move the test for default value of
+ jdk.includeInExceptions into own test
+ + S8217994: os::print_hex_dump should be more resilient against
+ unreadable memory
+ + S8218156: "jcmd VM.metaspace basic" misreports free chunk
+ space
+ + S8218192: Remove copy constructor for MemRegion
+ + S8218915: Change isJavaIdentifierStart and
+ isJavaIdentifierPart to handle new code points
+ + S8219251: Langtools tests default memory size needs to be 768m
+ + S8219260: Default number of test jobs needs to be consistently
+ calculated
+ + S8219461: Bump update version for OpenJDK jdk11.0.3
+ + S8219650: [Testbug] Fix potential crashes in new test hotspot
++++ 21 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory/java-11-openjdk/java-11-openjdk.changes
++++ and /work/SRC/openSUSE:Factory/.java-11-openjdk.new.5536/java-11-openjdk.changes
Old:
----
a01e0cc01059.tar.bz2
New:
----
175eb80c253a.tar.bz2
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ java-11-openjdk.spec ++++++
--- /var/tmp/diff_new_pack.VCyfx2/_old 2019-04-19 18:35:26.634960729 +0200
+++ /var/tmp/diff_new_pack.VCyfx2/_new 2019-04-19 18:35:26.634960729 +0200
@@ -32,13 +32,13 @@
# Standard JPackage naming and versioning defines.
%global featurever 11
%global interimver 0
-%global updatever 2
+%global updatever 3
%global patchver 0
-%global datever 2018-10-16
+%global datever 2019-04-16
%global buildver 7
%global hg_project jdk-updates
%global hg_repository jdk11u
-%global hg_revision a01e0cc01059
+%global hg_revision 175eb80c253a
%global icedtea_sound_version 1.0.1
# JavaEE modules
%global java_atk_wrapper_version 0.33.2
@@ -146,7 +146,7 @@
Version: %{featurever}.%{interimver}.%{updatever}.%{patchver}
Release: 0
Summary: OpenJDK %{featurever} Runtime Environment
-License: Apache-1.1 AND Apache-2.0 AND GPL-1.0-or-later AND GPL-2.0-only AND GPL-2.0-with-classpath-exception AND LGPL-2.0-only AND MPL-1.0 AND MPL-1.1 AND SUSE-Public-Domain AND W3C
+License: Apache-1.1 AND Apache-2.0 AND GPL-1.0-or-later AND GPL-2.0-only AND GPL-2.0-only WITH Classpath-exception-2.0 AND LGPL-2.0-only AND MPL-1.0 AND MPL-1.1 AND SUSE-Public-Domain AND W3C
Group: Development/Languages/Java
URL: http://openjdk.java.net/
# Sources from upstream OpenJDK project.
++++++ a01e0cc01059.tar.bz2 -> 175eb80c253a.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/java-11-openjdk/a01e0cc01059.tar.bz2 /work/SRC/openSUSE:Factory/.java-11-openjdk.new.5536/175eb80c253a.tar.bz2 differ: char 11, line 1
++++++ java11-improved-fonts.patch ++++++
--- /var/tmp/diff_new_pack.VCyfx2/_old 2019-04-19 18:35:26.794960932 +0200
+++ /var/tmp/diff_new_pack.VCyfx2/_new 2019-04-19 18:35:26.794960932 +0200
@@ -225,15 +225,21 @@
if (error) {
//do not destroy scaler yet.
//this can be problem of particular context (e.g. with bad transform)
-@@ -741,9 +915,13 @@
+@@ -741,12 +915,19 @@
/* generate bitmap if it is not done yet
e.g. if algorithmic styling is performed and style was added to outline */
+#ifdef IMPROVED_FONT_RENDERING
-+ FT_Render_Glyph(ftglyph, renderingProperties.ftRenderMode);
++ error = FT_Render_Glyph(ftglyph, renderingProperties.ftRenderMode);
++ if (error != 0) {
++ return ptr_to_jlong(getNullGlyphImage());
++ }
+#else
if (ftglyph->format == FT_GLYPH_FORMAT_OUTLINE) {
- FT_Render_Glyph(ftglyph, FT_LOAD_TARGET_MODE(target));
+ error = FT_Render_Glyph(ftglyph, FT_LOAD_TARGET_MODE(target));
+ if (error != 0) {
+ return ptr_to_jlong(getNullGlyphImage());
+ }
}
+#endif