java-1_8_0-openj9-accessibility-1.8.0.382-150200.3.36.1 >  A dۗp9|xI湫= b vfX+hY(5cnBiҁX1^4 5*'|.OqhKAI%! (d5&8Xύ kɓUN?^MM8 z|"t#fv(GaXTYA"x9#Enmi.ɘ,j0.%کϵׇK.:<t']$a78dc56d925ed7104ad7f79ad9086b5fdb0c9a91c46c782e1b6eb30fafc20ae2c9f309b31a1e14b0273a3903114f88da3c96ae5c5c-<dۗp9|2ܪvdz]1 1.< )s&_|s yJQXs%IMCGA&ZeLF?ѕUIJʙ|:-TUcq*",:"&N36pM /`xc[+{oc_$3+IggDJV;Lyp|(rrb75Xǭ0EzK*hD_iVEn"DMO @1U(SM4.3B҂AV@>p=((?(d", : \1R +Fflt8H P X h  ,v(89 : H>$F$G$H$I$X$Y%\%H]%X^%b&8c&d'me'rf'ul'wu'v'z''''(Cjava-1_8_0-openj9-accessibility1.8.0.382150200.3.36.1OpenJDK 8 accessibility connectorEnables accessibility support in OpenJDK 8 by using java-atk-wrapper. This allows compatible at-spi2 based accessibility programs to work for AWT and Swing-based programs. Please note, the java-atk-wrapper is still in beta, and OpenJDK 8 itself is still being tuned to be working with accessibility features. There are known issues with accessibility on, so please do not install this package unless you really need to.dەibs-arm-31eSUSE Linux Enterprise 15SUSE LLC Apache-1.1 AND Apache-2.0 AND EPL-2.0 AND GPL-1.0-or-later AND GPL-2.0-only AND GPL-2.0-only WITH Classpath-exception-2.0 AND LGPL-2.0-only AND MPL-1.0 AND MPL-1.1 AND SUSE-Public-Domain AND W3Chttps://www.suse.com/Development/Languages/Javahttps://www.eclipse.org/openj9/linuxaarch64# create links to java-atk-wrapper if [ ! -e /usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/aarch64/libatk-wrapper.so ]; then if [ -e /usr/lib64/java-atk-wrapper/libatk-wrapper.so ]; then ln -sf /usr/lib64/java-atk-wrapper/libatk-wrapper.so /usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/aarch64/libatk-wrapper.so else ln -sf /usr/lib64/java-atk-wrapper/libatk-wrapper.so.0 /usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/aarch64/libatk-wrapper.so fi fi if [ ! -e /usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/ext/java-atk-wrapper.jar ]; then ln -sf /usr/lib64/java-atk-wrapper/java-atk-wrapper.jar /usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/ext/java-atk-wrapper.jar fieA큤dە{dە{dە{dە{59efab1b25eee4d097bdb8a34b3207cb90afcca58ddd76a1ee7e5452921ed967@@rootrootrootrootrootrootrootrootjava-1_8_0-openj9-1.8.0.382-150200.3.36.1.src.rpmconfig(java-1_8_0-openj9-accessibility)java-1_8_0-openj9-accessibilityjava-1_8_0-openj9-accessibility(aarch-64)    /bin/shconfig(java-1_8_0-openj9-accessibility)java-1_8_0-openj9java-atk-wrapperrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.8.0.382-150200.3.36.11.8.0.382-150200.3.36.13.0.4-14.6.0-14.0-15.2-14.14.1dhdd"dc_bbb@b@a(@`̊`` @`f@`@_^@^^@^.fstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.com- Update to OpenJDK 8u382 build 05 with OpenJ9 0.40.0 virtual machine - Including Oracle July 2023 CPU changes * CVE-2023-22045 (bsc#1213481), CVE-2023-22049 (bsc#1213482) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.40 - Modified patch: * stringop-overflow.patch + rediff to changed context- Update to OpenJDK 8u372 build 07 with OpenJ9 0.38.0 virtual machine - Including Oracle April 2023 CPU changes * CVE-2023-21930 (bsc#1210628), CVE-2023-21937 (bsc#1210631), CVE-2023-21938 (bsc#1210632), CVE-2023-21939 (bsc#1210634), CVE-2023-21954 (bsc#1210635), CVE-2023-21967 (bsc#1210636), CVE-2023-21968 (bsc#1210637) * OpenJ9 specific vulnerability: CVE-2023-2597 (bsc#1211615) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.38- Added patch: * stringop-overflow.patch + disable -Wstringop-overflow and fix build in Factory- Update to OpenJDK 8u362 build 09 with OpenJ9 0.36.0 virtual machine - Including Oracle January 2023 CPU changes CVE-2023-21830 (bsc#1207249), CVE-2023-21843 (bsc#1207248) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.36/- Update to OpenJDK 8u352 build 08 with OpenJ9 0.35.0 virtual machine * Including Oracle October 2022 CPU changes CVE-2022-21619 (bsc#1204473), CVE-2022-21626 (bsc#1204471), CVE-2022-21624 (bsc#1204475), CVE-2022-21628 (bsc#1204472) * Fixes OpenJ9 vulnerability bsc#1204703, CVE-2022-3676 * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.35- Update to OpenJDK 8u345 build 01 with OpenJ9 0.33.0 virtual machine * Including Oracle July 2022 CPU changes CVE-2022-21540 (bsc#1201694), CVE-2022-21541 (bsc#1201692), CVE-2022-34169 (bsc#1201684) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.33 - Modified template patch: * openj9-nogit.patch.in + The git commit hash code became more generic, so redo the template patch - Added patch: * openj9-no-narrowing.patch + Fix narrowing conversion error- Update to OpenJDK 8u332 build 09 with OpenJ9 0.32.0 virtual machine * Fixes bsc#1198935, CVE-2021-41041: unverified methods can be invoked using MethodHandles * Including Oracle April 2022 CPU fixes CVE-2022-21426 (bsc#1198672), CVE-2022-21434 (bsc#1198674), CVE-2022-21443 (bsc#1198675), CVE-2022-21476 (bsc#1198671), CVE-2022-21496 (bsc#1198673) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.32- Update to OpenJDK 8u322 build 04 with OpenJ9 0.30.0 virtual machine * including Oracle January 2022 CPU changes CVE-2022-21248 (bsc#1194926), CVE-2022-21277 (bsc#1194930), CVE-2022-21282 (bsc#1194933), CVE-2022-21291 (bsc#1194925), CVE-2022-21293 (bsc#1194935), CVE-2022-21294 (bsc#1194934), CVE-2022-21296 (bsc#1194932), CVE-2022-21299 (bsc#1194931), CVE-2022-21305 (bsc#1194939), CVE-2022-21340 (bsc#1194940), CVE-2022-21341 (bsc#1194941), CVE-2022-21360 (bsc#1194929), CVE-2022-21365 (bsc#1194928), CVE-2022-21366 (bsc#1194927), * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.30 - Added patch: * libdwarf-fix.patch + fix build with different versions of libdwarf- Update to OpenJDK 8u312 build 07 with OpenJ9 0.29.0 virtual machine * including Oracle July 2021 and October 2021 CPU changes CVE-2021-2341 (bsc#1188564), CVE-2021-2369 (bsc#1188565), CVE-2021-2388 (bsc#1188566), CVE-2021-35550 (bsc#1191901), CVE-2021-35565 (bsc#1191909), CVE-2021-35556 (bsc#1191910), CVE-2021-35559 (bsc#1191911), CVE-2021-35561 (bsc#1191912), CVE-2021-35564 (bsc#1191913), CVE-2021-35567 (bsc#1191903), CVE-2021-35578 (bsc#1191904), CVE-2021-35586 (bsc#1191914), CVE-2021-35603 (bsc#1191906) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.29 - Remove the unneeded icedtea-sound provider - Removed patches: * jdk-gcc-warnings.patch * maybe-uninitialized.patch * omr-no-return-in-nonvoid-function.patch + integrated upstream- Remove the forcing of DWARF version 4, since the libdwarf in factory works correctly with this build and DWARF5 symbol format - Expand supported architectures to aarch64- Force DWARF version 4 when building with gcc >= 11 * the internal omr tools set error with debugging information in DWARF5 format * fixes build in factory- Fix version typo in spec file- Update to OpenJDK 8u292 build 10 with OpenJ9 0.26.0 virtual machine * including Oracle April 2021 CPU changes (bsc#1185055, CVE-2021-2163 and bsc#1185056, CVE-2021-2161) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.26 - Added patch: * maybe-uninitialized.patch + initialize variables in constructor + fixes build with newer gcc- Update to OpenJDK 8u282 build 08 with OpenJ9 0.24.0 virtual machine * including Oracle January 2021 CPU changes (bsc#1181239) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.24 - Modified template patch: * openj9-nogit.patch.in + replace git runs by pre-fetched git hashes in new places + remove hunks that are irrelevant in new sources- Update to OpenJDK 8u272 build 10 with OpenJ9 0.23.0 virtual machine * including Oracle July 2020 CPU changes (bsc#1174157) and October 2020 CPU changes (bsc#1177943) + fixes CVE-2020-14556, CVE-2020-14577, CVE-2020-14578, CVE-2020-14579, CVE-2020-14581, CVE-2020-14583, CVE-2020-14593, CVE-2020-14621, CVE-2020-14779, CVE-2020-14781, CVE-2020-14782, CVE-2020-14792, CVE-2020-14796, CVE-2020-14797, CVE-2020-14798 and CVE-2020-14803 - Removed patch: * gcc10.patch + not needed any more in this version - Modified patches: * java-atk-wrapper-security.patch * openj9-no-werror.patch * system-lcms.patch + rediff to changed context - Added patch: * omr-no-return-in-nonvoid-function.patch + fix build error on some systems- Added patches: * gcc10.patch + Fix dupplicate global pointer variables with gcc 10 + openj9-no-werror.patch + Do not build with warnings as errors the OpenJ9 parts, since that would mean broken build with new warnings from gcc 10- Update to OpenJDK 8u252 build 09 with OpenJ9 0.20.0 virtual machine * including Oracle April 2020 CPU changes (bsc#1169511) + fixes: CVE-2020-2754, CVE-2020-2755, CVE-2020-2756, CVE-2020-2757, CVE-2020-2773, CVE-2020-2781, CVE-2020-2800, CVE-2020-2803, CVE-2020-2805 and CVE-2020-2830 * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.20- The pack200 and unpack200 alternatives should be slaves of java and not of javac, since they are part of JRE (bsc#1171352).- Initial packaging of OpenJDK 1.8.0_242-b08 with OpenJ9 0.18.1/bin/shibs-arm-31 16921123291.8.0.382-150200.3.36.11.8.0.382-150200.3.36.11.8.0.382-150200.3.36.1libatk-wrapper.soaccessibility.propertiesextjava-atk-wrapper.jar/usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/aarch64//usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib//usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/ext/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:30261/SUSE_SLE-15-SP2_Update/c1c50f0673939bc256c2480a43e2f6b8-java-1_8_0-openj9.SUSE_SLE-15-SP2_Updatecpioxz5aarch64-suse-linuxemptyASCII textdirectory,s%\>"rutf-83bb04965c00f13253c851d257a6fd43a852679aa993bed3f6149e7d94548cc44?07zXZ !t/?] cNſ^J0htme=>? EC0s˔,bPWn B؂} ~ w-Y 3k[!uӲ;YrNJwmsǃ{5=)ͷ $kЈW0g G}~&oO n@7aDF9 IH]{uh)c[X˟=M` )3uhoe5TW<1w?Ǒkeϴk YZ