Name: | java-1.6.0-openjdk-javadoc |
Epoch: | 1 |
Version: | 1.6.0.0 |
Release: | 6.1.13.1.el7 |
Architecture: | x86_64 |
Group: | Documentation |
Size: | 227299859 |
License: | ASL 1.1, ASL 2.0, GPL+, GPLv2, GPLv2 with exceptions, LGPL+, LGPLv2, MPLv1.0, MPLv1.1, Public Domain, W3C |
RPM: |
java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.1.el7.x86_64.rpm
|
Source RPM: |
java-1.6.0-openjdk-1.6.0.0-6.1.13.1.el7.src.rpm
|
Build Date: | Wed May 07 2014 |
Build Host: | ca-buildj3.us.oracle.com |
Vendor: | Oracle America |
URL: | http://icedtea.classpath.org/ |
Summary: | OpenJDK API Documentation |
Description: | The OpenJDK API documentation. |
-
Thu Mar 13 2014 Jiri Vanek <jvanek@redhat.com> - 1:1.6.0.1-7.1.13.1
- added and applied patch9 1051245.patch
- Resolves: rhbz#1070816
-
Fri Feb 21 2014 Jiri Vanek <jvanek@redhat.com> - 1:1.6.0.1-5.1.13.1
- removed redundant (we have in tree copy) rhino requires
- Resolves: rhbz#1066873
-
Fri Jan 24 2014 Daniel Mach <dmach@redhat.com> - 1:1.6.0.0-4.1.13.1
- Mass rebuild 2014-01-24
-
Thu Jan 23 2014 Jiri Vanek <jvanek@redhat.com> - 1:1.6.0.1-3.1.13.0
- updated to icedtea 1.13.1
- http://blog.fuseyism.com/index.php/2014/01/23/security-icedtea-1-12-8-1-13-1-for-openjdk-6-released/
- updated to jdk6, b30, 21_jan_2014
- https://openjdk6.java.net/OpenJDK6-B30-Changes.html
- adapted patch7 1.13_fixes.patch
- pre 2011 changelog moved to (till now wrong) pre-2009-spec-changelog (rh1043611)
- added --disable-system-lcms to configure options to pass build
- adapted patch3 java-1.6.0-openjdk-java-access-bridge-security.patch
- removed upstreamed patch103 type_hsx23_patch3.patch
- Resolves: rhbz#1053279
-
Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 1:1.6.0.0-2.1.13.0
- Mass rebuild 2013-12-27
-
Wed Oct 30 2013 Jiri Vanek <jvanek@redhat.com> - 1:1.6.0.1-1.66.1.13.0
- updated to icedtea 1.13
- updated to openjdk-6-src-b28-04_oct_2013
- added --disable-lcms2 configure switch to fix tck
- removed upstreamed patch7,java-1.6.0-openjdk-jstack.patch
- removed patch100: 8000791-regression-fix.patch
- added patch7 1.13_fixes.patch to fix 1.13 build issues
- adapted patch0 java-1.6.0-openjdk-optflags.patch
- adapted patch3 java-1.6.0-openjdk-java-access-bridge-security.patch
- removed useless runtests parts
- included also java.security.old files
- added:
- Patch103 type_hsx23_patch3.patch
- Patch104 type_hsx23_patch4.patch
-to fix zero type error
-aplied everywhere, as should go upstream
- Resolves: rhbz#1018679
-
Thu Aug 22 2013 Deepak Bhole <dbhole@redhat.com> - 1:1.6.0.0-1.64.1.11.12
- Removed the temporary libffi-compat-5 requirement
- Updated BR to java6-1.6.0-devel
- Build with OpenJDK6 specifically
-
Fri Aug 16 2013 Deepak Bhole <dbhole@redhat.com> - 1:1.6.0.0-1.63.1.11.12
- Merged with latest version from 6.5 branch
-
Tue Nov 01 2011 Jiri Vanek <jvanek@redhat.com> - 1:1.6.0.0-60.1.10.4
- omajid have added Patch6 as (probably temporally) solution for S7103224 for buildability on newest glibc libraries.
-
Thu Oct 13 2011 Jiri Vanek <jvanek@redhat.com> - 1:1.6.0.0-60.1.10.4
- updated to icedtea6 1.10.4
- Security fixes
- S7000600, CVE-2011-3547: InputStream skip() information leak
- S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor
- S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow
- S7032417, CVE-2011-3552: excessive default UDP socket limit under SecurityManager
- S7046823, CVE-2011-3544: missing SecurityManager checks in scripting engine
- S7055902, CVE-2011-3521: IIOP deserialization code execution
- S7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress error checks
- S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)
- S7070134, CVE-2011-3558: HotSpot crashes with sigsegv from PorterStemmer
- S7077466, CVE-2011-3556: RMI DGC server remote code execution
- S7083012, CVE-2011-3557: RMI registry privileged code execution
- S7096936, CVE-2011-3560: missing checkSetFactory calls in HttpsURLConnection
- Bug fixes
- RH727195 : Japanese font mappings are broken
- Backports
- S6826104, RH730015: Getting a NullPointer exception when clicked on Application & Toolkit Modal dialog
- Zero/Shark
- PR690: Shark fails to JIT using hs20.
- PR696: Zero fails to handle fast_aldc and fast_aldc_w in hs20.