pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/lang/openjdk7



Module Name:    pkgsrc
Committed By:   ryoon
Date:           Sat Jan 25 13:53:22 UTC 2014

Modified Files:
        pkgsrc/lang/openjdk7: Makefile PLIST distinfo
        pkgsrc/lang/openjdk7/patches: patch-aw
Added Files:
        pkgsrc/lang/openjdk7/patches:
            patch-jdk_src_solaris_classes_sun_net_PortConfig.java

Log Message:
Update to 1.7.51

I cannot find release notes for OpenJDK7, I will quote from Oracle's
JDK 7u51 release notes.

Changelog:
7u51: http://www.oracle.com/technetwork/java/javase/7u51-relnotes-2085002.html
Olson Data 2013h
JDK 7u51 contains Olson time zone data version 2013h.

New Features and Changes
Jarsigner updated to encourage timestamping

Timestamping for a signed jar is now strongly recommended. The Jarsigner tool 
will print out an informational warning at signing or verifying when timestamp 
is missing. For more information, see Signing JAR Files.

See 8023338.
Changes to Security Slider:

The following changes to Security Slider were included in this release(7u51):

    Block Self-Signed and Unsigned applets on High Security Setting
    Require Permissions Attribute for High Security Setting
    Warn users of missing Permissions Attributes for Medium Security Setting

For more information, see Java Control Panel documentation.
Prompt users to clear previously remembered decisions:

In JDK 7u51, users are given an option to restore the security prompts, for any 
prompts that were hidden prior to installing the latest release. For more 
information, see Install Documentation for Windows.

It is recommended that users restore security prompts after every 30 days to 
ensure better protection.

Note: This option is offered only during Auto update on Mac OS.
Exception Site List:

The Exception Site List feature allows end users to run Java applets and Java 
Web Start applications that do not meet the latest security requirements. Rich 
Internet Applications that are hosted on a site in the exception site list are 
allowed to run with the applicable security prompts.

For more information, see Exception Site List documentation.
Change in Default Socket Permissions

The default socket permissions assigned to all code including untrusted code 
have been changed in this release. Previously, all code was able to bind any 
socket type to any port number greater than or equal to 1024. It is still 
possible to bind sockets to the ephemeral port range on each system. The exact 
range of ephemeral ports varies from one operating system to another, but it is 
typically in the high range (such as from 49152 to 65535). The new restriction 
is that binding sockets outside of the ephemeral range now requires an explicit 
permission in the system security policy.

Most applications using client tcp sockets and a security manager will not see 
any problem, as these typically bind to ephemeral ports anyway. Applications 
using datagram sockets or server tcp sockets (and a security manager) may 
encounter security exceptions where none were seen before. If this occurs, 
users should review whether the port number being requested is expected, and if 
this is the case, a socket permission grant can be added to the local security 
policy, to resolve the issue.

See 8011786 (not public).
Change in JAXP Xalan Extension Functions

In JDK 7u51, a change has been made in JAXP Xalan Extension functions to always 
use the default DOM implementation when Security Manager is present. This 
change affects the NodeSet created by DOM Document.

Before this change, the DOM implementation is located through the DOM factory 
lookup process. With this change, when security is enabled, the lookup process 
is skipped and the default DOM implementation is used.

This change will only affect those applications that use a 3rd party DOM 
implementation. In general, the NodeSet structure is expected to be compatible 
with that of the JDK default implementation.
Bug Fixes

This release contains fixes for security vulnerabilities. For more information, 
see Oracle Java SE Critical Patch Update Advisory.

For a list of bug fixes included in this release, see JDK 7u51 Bug Fixes page.

The following are some of the notable bug fixes in this release:

Area: tools/jar
Synopsis: Clarify jar verifications

The jarsigner tool prints out more messages when there are severe warnings and 
-strict is on. For details, see the jarsigner tool documentation 
(Windows)(Solaris/Linux).

See 8024302 (not public).


To generate a diff of this commit:
cvs rdiff -u -r1.58 -r1.59 pkgsrc/lang/openjdk7/Makefile
cvs rdiff -u -r1.13 -r1.14 pkgsrc/lang/openjdk7/PLIST
cvs rdiff -u -r1.40 -r1.41 pkgsrc/lang/openjdk7/distinfo
cvs rdiff -u -r1.2 -r1.3 pkgsrc/lang/openjdk7/patches/patch-aw
cvs rdiff -u -r0 -r1.1 \
    
pkgsrc/lang/openjdk7/patches/patch-jdk_src_solaris_classes_sun_net_PortConfig.java

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.




Home | Main Index | Thread Index | Old Index