Update to shenandoah-jdk8u432-b06 (GA)
- Update release notes for shenandoah-8u432-b06. - Switch to GA mode. ** This tarball is embargoed until 2024-10-15 @ 1pm PT. ** Resolves: RHEL-61281
This commit is contained in:
parent
e72e4df309
commit
f96a25e277
1
.gitignore
vendored
1
.gitignore
vendored
@ -306,3 +306,4 @@
|
|||||||
/shenandoah8u422-b01.tar.xz
|
/shenandoah8u422-b01.tar.xz
|
||||||
/shenandoah8u422-b05.tar.xz
|
/shenandoah8u422-b05.tar.xz
|
||||||
/shenandoah8u432-b05.tar.xz
|
/shenandoah8u432-b05.tar.xz
|
||||||
|
/shenandoah8u432-b06.tar.xz
|
||||||
|
78
NEWS
78
NEWS
@ -8,6 +8,20 @@ New in release OpenJDK 8u432 (2024-10-15):
|
|||||||
Live versions of these release notes can be found at:
|
Live versions of these release notes can be found at:
|
||||||
* https://bit.ly/openjdk8u432
|
* https://bit.ly/openjdk8u432
|
||||||
|
|
||||||
|
* CVEs
|
||||||
|
- CVE-2024-21208
|
||||||
|
- CVE-2024-21210
|
||||||
|
- CVE-2024-21217
|
||||||
|
- CVE-2024-21235
|
||||||
|
* Security fixes
|
||||||
|
- JDK-8290367, JDK-8332643: Update default value and extend the scope of com.sun.jndi.ldap.object.trustSerialData system property
|
||||||
|
- JDK-8313626, JDK-8307769: C2 crash due to unexpected exception control flow
|
||||||
|
- JDK-8328286: Enhance HTTP client
|
||||||
|
- JDK-8328544: Improve handling of vectorization
|
||||||
|
- JDK-8328726: Better Kerberos support
|
||||||
|
- JDK-8331446: Improve deserialization support
|
||||||
|
- JDK-8332644: Improve graph optimizations
|
||||||
|
- JDK-8335713: Enhance vectorization analysis
|
||||||
* Other changes
|
* Other changes
|
||||||
- JDK-4660158: TTY: NumberFormatException while trying to set values by 'set' command
|
- JDK-4660158: TTY: NumberFormatException while trying to set values by 'set' command
|
||||||
- JDK-6544871: java/awt/event/KeyEvent/KeyTyped/CtrlASCII.html fails from jdk b09 on windows.
|
- JDK-6544871: java/awt/event/KeyEvent/KeyTyped/CtrlASCII.html fails from jdk b09 on windows.
|
||||||
@ -21,8 +35,11 @@ Live versions of these release notes can be found at:
|
|||||||
- JDK-8145919: sun/management/jmxremote/bootstrap/RmiSslBootstrapTest failed with Connection failed for no credentials
|
- JDK-8145919: sun/management/jmxremote/bootstrap/RmiSslBootstrapTest failed with Connection failed for no credentials
|
||||||
- JDK-8152207: Perform array bound checks while getting a length of bytecode instructions
|
- JDK-8152207: Perform array bound checks while getting a length of bytecode instructions
|
||||||
- JDK-8193682: Infinite loop in ZipOutputStream.close()
|
- JDK-8193682: Infinite loop in ZipOutputStream.close()
|
||||||
|
- JDK-8196770: Add JNDI test com/sun/jndi/ldap/blits/AddTests/AddNewEntry.java
|
||||||
- JDK-8221903: PIT: javax/swing/RepaintManager/IconifyTest/IconifyTest.java fails on ubuntu18.04
|
- JDK-8221903: PIT: javax/swing/RepaintManager/IconifyTest/IconifyTest.java fails on ubuntu18.04
|
||||||
|
- JDK-8233364: Fix undefined behavior in Canonicalizer::do_ShiftOp
|
||||||
- JDK-8238274: (sctp) JDK-7118373 is not fixed for SctpChannel
|
- JDK-8238274: (sctp) JDK-7118373 is not fixed for SctpChannel
|
||||||
|
- JDK-8251188: Update LDAP tests not to use wildcard addresses
|
||||||
- JDK-8264328: Broken license in javax/swing/JComboBox/8072767/bug8072767.java
|
- JDK-8264328: Broken license in javax/swing/JComboBox/8072767/bug8072767.java
|
||||||
- JDK-8266248: Compilation failure in PLATFORM_API_MacOSX_MidiUtils.c with Xcode 12.5
|
- JDK-8266248: Compilation failure in PLATFORM_API_MacOSX_MidiUtils.c with Xcode 12.5
|
||||||
- JDK-8278794: Infinite loop in DeflaterOutputStream.finish()
|
- JDK-8278794: Infinite loop in DeflaterOutputStream.finish()
|
||||||
@ -63,6 +80,8 @@ Live versions of these release notes can be found at:
|
|||||||
- JDK-8337312: [8u] Windows x86 VS2010 build broken by JDK-8320097
|
- JDK-8337312: [8u] Windows x86 VS2010 build broken by JDK-8320097
|
||||||
- JDK-8337664: Distrust TLS server certificates issued after Oct 2024 and anchored by Entrust Root CAs
|
- JDK-8337664: Distrust TLS server certificates issued after Oct 2024 and anchored by Entrust Root CAs
|
||||||
- JDK-8338144: [8u] Remove duplicate license files
|
- JDK-8338144: [8u] Remove duplicate license files
|
||||||
|
- JDK-8341057: Add 2 SSL.com TLS roots
|
||||||
|
- JDK-8341059: Change Entrust TLS distrust date to November 12, 2024
|
||||||
|
|
||||||
Notes on individual issues:
|
Notes on individual issues:
|
||||||
===========================
|
===========================
|
||||||
@ -88,21 +107,22 @@ This change has no effect on TLS_ECDHE cipher suites, which remain
|
|||||||
enabled by default.
|
enabled by default.
|
||||||
|
|
||||||
JDK-8337664: Distrust TLS server certificates issued after Oct 2024 and anchored by Entrust Root CAs
|
JDK-8337664: Distrust TLS server certificates issued after Oct 2024 and anchored by Entrust Root CAs
|
||||||
|
JDK-8341059: Change Entrust TLS distrust date to November 12, 2024
|
||||||
====================================================================================================
|
====================================================================================================
|
||||||
In accordance with similar plans recently announced by Google and
|
In accordance with similar plans recently announced by Google and
|
||||||
Mozilla, the JDK will not trust Transport Layer Security (TLS)
|
Mozilla, the JDK will not trust Transport Layer Security (TLS)
|
||||||
certificates issued after the 31st of October 2024 which are anchored
|
certificates issued after the 11th of November 2024 which are anchored
|
||||||
by Entrust root certificates. This includes certificates branded as
|
by Entrust root certificates. This includes certificates branded as
|
||||||
AffirmTrust, which are managed by Entrust.
|
AffirmTrust, which are managed by Entrust.
|
||||||
|
|
||||||
Certificates issued on or before October 31st, 2024 will continue to
|
Certificates issued on or before November 11th, 2024 will continue to
|
||||||
be trusted until they expire.
|
be trusted until they expire.
|
||||||
|
|
||||||
If a server's certificate chain is anchored by an affected
|
If a server's certificate chain is anchored by an affected
|
||||||
certificate, attempts to negotiate a TLS session will fail with an
|
certificate, attempts to negotiate a TLS session will fail with an
|
||||||
Exception that indicates the trust anchor is not trusted. For example,
|
Exception that indicates the trust anchor is not trusted. For example,
|
||||||
|
|
||||||
"TLS server certificate issued after 2024-10-31 and anchored by a
|
"TLS server certificate issued after 2024-11-11 and anchored by a
|
||||||
distrusted legacy Entrust root CA: CN=Entrust.net Certification
|
distrusted legacy Entrust root CA: CN=Entrust.net Certification
|
||||||
Authority (2048), OU=(c) 1999 Entrust.net Limited,
|
Authority (2048), OU=(c) 1999 Entrust.net Limited,
|
||||||
OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.),
|
OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.),
|
||||||
@ -189,6 +209,21 @@ the `java.security` configuration file (or override it by using the
|
|||||||
longer listed in the `jdk.security.caDistrustPolicies` security
|
longer listed in the `jdk.security.caDistrustPolicies` security
|
||||||
property.
|
property.
|
||||||
|
|
||||||
|
security-libs/java.security:
|
||||||
|
|
||||||
|
JDK-8341057: Add 2 SSL.com TLS roots
|
||||||
|
====================================
|
||||||
|
The following root certificates have been added to the cacerts
|
||||||
|
truststore:
|
||||||
|
|
||||||
|
Name: SSL.com
|
||||||
|
Alias Name: ssltlsrootecc2022
|
||||||
|
Distinguished Name: CN=SSL.com TLS ECC Root CA 2022, O=SSL Corporation, C=US
|
||||||
|
|
||||||
|
Name: SSL.com
|
||||||
|
Alias Name: ssltlsrootrsa2022
|
||||||
|
Distinguished Name: CN=SSL.com TLS RSA Root CA 2022, O=SSL Corporation, C=US
|
||||||
|
|
||||||
client-libs:
|
client-libs:
|
||||||
|
|
||||||
JDK-8307779: Relax the java.awt.Robot specification
|
JDK-8307779: Relax the java.awt.Robot specification
|
||||||
@ -200,6 +235,43 @@ methods in the `java.awt.Robot` class - `mouseMove(int,int)`,
|
|||||||
allow these methods to fail when the desktop environment does not
|
allow these methods to fail when the desktop environment does not
|
||||||
permit moving the mouse pointer or capturing screen content.
|
permit moving the mouse pointer or capturing screen content.
|
||||||
|
|
||||||
|
core-libs/javax.naming:
|
||||||
|
|
||||||
|
JDK-8290367, JDK-8332643: Update default value and extend the scope of com.sun.jndi.ldap.object.trustSerialData system property
|
||||||
|
===============================================================================================================================
|
||||||
|
With this OpenJDK release, the JDK implementation of the LDAP provider
|
||||||
|
no longer supports the deserialisation of Java objects by
|
||||||
|
default. This is achieved by the system property
|
||||||
|
`com.sun.jndi.ldap.object.trustSerialData` being set to `false` by
|
||||||
|
default.
|
||||||
|
|
||||||
|
Note that this release also increases the scope of the
|
||||||
|
`com.sun.jndi.ldap.object.trustSerialData` to cover the reconstruction
|
||||||
|
of RMI remote objects from the `javaRemoteLocation` LDAP attribute.
|
||||||
|
|
||||||
|
The result of this change is that transparent deserialisation of Java
|
||||||
|
objects will require an explicit opt-in. Applications that wish to
|
||||||
|
reconstruct Java objects and RMI stubs from LDAP attributes will need
|
||||||
|
to set the `com.sun.jndi.ldap.object.trustSerialData` to `true`.
|
||||||
|
|
||||||
|
core-libs/java.net:
|
||||||
|
|
||||||
|
JDK-8328286: Enhance HTTP client
|
||||||
|
================================
|
||||||
|
This OpenJDK release limits the maximum header field size accepted by
|
||||||
|
the HTTP client within the JDK for all supported versions of the HTTP
|
||||||
|
protocol. The header field size is computed as the sum of the size of
|
||||||
|
the uncompressed header name, the size of the uncompressed header
|
||||||
|
value and a overhead of 32 bytes for each field section line. If a
|
||||||
|
peer sends a field section that exceeds this limit, a
|
||||||
|
`java.net.ProtocolException` will be raised.
|
||||||
|
|
||||||
|
This release also introduces a new system property,
|
||||||
|
`jdk.http.maxHeaderSize`. This property can be used to alter the
|
||||||
|
maximum header field size (in bytes) or disable it by setting the
|
||||||
|
value to zero or a negative value. The default value is 393,216 bytes
|
||||||
|
or 384kB.
|
||||||
|
|
||||||
core-libs/java.util.jar:
|
core-libs/java.util.jar:
|
||||||
|
|
||||||
JDK-8193682: Infinite loop in ZipOutputStream.close()
|
JDK-8193682: Infinite loop in ZipOutputStream.close()
|
||||||
|
@ -299,7 +299,7 @@
|
|||||||
# Define version of OpenJDK 8 used
|
# Define version of OpenJDK 8 used
|
||||||
%global project openjdk
|
%global project openjdk
|
||||||
%global repo shenandoah-jdk8u
|
%global repo shenandoah-jdk8u
|
||||||
%global openjdk_revision 8u432-b05
|
%global openjdk_revision 8u432-b06
|
||||||
%global shenandoah_revision shenandoah%{openjdk_revision}
|
%global shenandoah_revision shenandoah%{openjdk_revision}
|
||||||
# Define IcedTea version used for SystemTap tapsets and desktop files
|
# Define IcedTea version used for SystemTap tapsets and desktop files
|
||||||
%global icedteaver 3.15.0
|
%global icedteaver 3.15.0
|
||||||
@ -356,7 +356,7 @@
|
|||||||
# Release will be (where N is usually a number starting at 1):
|
# Release will be (where N is usually a number starting at 1):
|
||||||
# - 0.N%%{?extraver}%%{?dist} for EA releases,
|
# - 0.N%%{?extraver}%%{?dist} for EA releases,
|
||||||
# - N%%{?extraver}{?dist} for GA releases
|
# - N%%{?extraver}{?dist} for GA releases
|
||||||
%global is_ga 0
|
%global is_ga 1
|
||||||
%if %{is_ga}
|
%if %{is_ga}
|
||||||
%global milestone fcs
|
%global milestone fcs
|
||||||
%global milestone_version %{nil}
|
%global milestone_version %{nil}
|
||||||
@ -2684,10 +2684,9 @@ cjc.mainProgram(args)
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
* Thu Oct 10 2024 Andrew Hughes <gnu.andrew@redhat.com> - 1:1.8.0.432.b05-0.2.ea
|
* Fri Oct 11 2024 Andrew Hughes <gnu.andrew@redhat.com> - 1:1.8.0.432.b06-2
|
||||||
- Update to shenandoah-jdk8u432-b05 (EA)
|
- Update to shenandoah-jdk8u432-b06 (GA)
|
||||||
- Update release notes for shenandoah-8u432-b05.
|
- Update release notes for shenandoah-8u432-b06.
|
||||||
- Switch to EA mode.
|
|
||||||
- Drop JDK-828109{6,7,8}/PR3836 patch following integration of upstream version
|
- Drop JDK-828109{6,7,8}/PR3836 patch following integration of upstream version
|
||||||
- Regenerate JDK-8199936/PR3533 patch following JDK-828109{6,7,8} integration
|
- Regenerate JDK-8199936/PR3533 patch following JDK-828109{6,7,8} integration
|
||||||
- Bump version of bundled zlib to 1.3.1 following JDK-8324632
|
- Bump version of bundled zlib to 1.3.1 following JDK-8324632
|
||||||
@ -2696,6 +2695,8 @@ cjc.mainProgram(args)
|
|||||||
- Add build scripts to repository to ease remembering all CentOS & RHEL targets and options
|
- Add build scripts to repository to ease remembering all CentOS & RHEL targets and options
|
||||||
- Resolves: RHEL-58792
|
- Resolves: RHEL-58792
|
||||||
- Resolves: RHEL-17183
|
- Resolves: RHEL-17183
|
||||||
|
- Resolves: RHEL-61281
|
||||||
|
- ** This tarball is embargoed until 2024-10-15 @ 1pm PT. **
|
||||||
|
|
||||||
* Wed Jul 10 2024 Andrew Hughes <gnu.andrew@redhat.com> - 1:1.8.0.422.b05-3
|
* Wed Jul 10 2024 Andrew Hughes <gnu.andrew@redhat.com> - 1:1.8.0.422.b05-3
|
||||||
- Bump rpmrelease for CentOS build
|
- Bump rpmrelease for CentOS build
|
||||||
|
2
sources
2
sources
@ -1,2 +1,2 @@
|
|||||||
SHA512 (tapsets-icedtea-3.15.0.tar.xz) = c752a197cb3d812d50c35e11e4722772be40096c81d2a57933e0d9b8a3c708b9c157b8108a4e33a06ca7bb81648170994408c75d6f69d5ff12785d0c31009671
|
SHA512 (tapsets-icedtea-3.15.0.tar.xz) = c752a197cb3d812d50c35e11e4722772be40096c81d2a57933e0d9b8a3c708b9c157b8108a4e33a06ca7bb81648170994408c75d6f69d5ff12785d0c31009671
|
||||||
SHA512 (shenandoah8u432-b05.tar.xz) = c6d7389d1beeabe423b29fbf9505d72a15859cccda7732d5648573a85ba02506b3dcda05bae8cf8924a641af9459e6fbcc4c0328cd5d15c65eff8cef5699d5b8
|
SHA512 (shenandoah8u432-b06.tar.xz) = ad40b6bd076508cb5702955e25a4f797dde4c2050b0833992b8713d0e1f80a8604367e887562e24ef8a7615603ebc833847eb1c06634aca658610914b92d78f6
|
||||||
|
Loading…
Reference in New Issue
Block a user