java-1_8_0-openj9-accessibility-1.8.0.372-150200.3.33.2 >  A d(`p9|T}dv cȐcw "\]!boKOKŦHX1o`vV?;¸ԓӚ*7 <\κ uђJȿz +}.(]Cҕ .܍2mG.5S 5Q =]:c__>  $⭿/6EY I8 !ho{zr)s@$*Kx00K`=un'%#L|%e41ed3289de89fe1dc8c3048b3fb94334c601d6700deaf8303adf28ffeb5a29438eb2e4e517a436706ad9c6047616292e2f6e96b+̉d(`p9|R;Ox{OQGFB7%'5\sBI rZut;||?DFX)y;qB(FV!goѼ;<w,g̈́0S9!z+Cx ]c~jTZָ=F· MrE쒶h2vزNm"FK%u]?*)b=1 k|ڌ~hLߔ,vBl4e9CC|_ `X#p+jD@>p=&?&d", : \-N 'Bbho0@ H P `  $j(89 : (>#GF#OG#dH#tI#X#Y#\#]#^$0b$c%sd%e&f&l& u&v&,z&G&X&\&b&Cjava-1_8_0-openj9-accessibility1.8.0.372150200.3.33.2OpenJDK 8 accessibility connectorEnables accessibility support in OpenJDK 8 by using java-atk-wrapper. This allows compatible at-spi2 based accessibility programs to work for AWT and Swing-based programs. Please note, the java-atk-wrapper is still in beta, and OpenJDK 8 itself is still being tuned to be working with accessibility features. There are known issues with accessibility on, so please do not install this package unless you really need to.d#*sheep51eSUSE Linux Enterprise 15SUSE LLC Apache-1.1 AND Apache-2.0 AND EPL-2.0 AND GPL-1.0-or-later AND GPL-2.0-only AND GPL-2.0-only WITH Classpath-exception-2.0 AND LGPL-2.0-only AND MPL-1.0 AND MPL-1.1 AND SUSE-Public-Domain AND W3Chttps://www.suse.com/Development/Languages/Javahttps://www.eclipse.org/openj9/linuxx86_64# create links to java-atk-wrapper if [ ! -e /usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/amd64/libatk-wrapper.so ]; then if [ -e /usr/lib64/java-atk-wrapper/libatk-wrapper.so ]; then ln -sf /usr/lib64/java-atk-wrapper/libatk-wrapper.so /usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/amd64/libatk-wrapper.so else ln -sf /usr/lib64/java-atk-wrapper/libatk-wrapper.so.0 /usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/amd64/libatk-wrapper.so fi fi if [ ! -e /usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/ext/java-atk-wrapper.jar ]; then ln -sf /usr/lib64/java-atk-wrapper/java-atk-wrapper.jar /usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/ext/java-atk-wrapper.jar fieA큤d"d"d"d"59efab1b25eee4d097bdb8a34b3207cb90afcca58ddd76a1ee7e5452921ed967@@rootrootrootrootrootrootrootrootjava-1_8_0-openj9-1.8.0.372-150200.3.33.2.src.rpmconfig(java-1_8_0-openj9-accessibility)java-1_8_0-openj9-accessibilityjava-1_8_0-openj9-accessibility(x86-64)    /bin/shconfig(java-1_8_0-openj9-accessibility)java-1_8_0-openj9java-atk-wrapperrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.8.0.372-150200.3.33.21.8.0.372-150200.3.33.23.0.4-14.6.0-14.0-15.2-14.14.1dd"dc_bbb@b@a(@`̊`` @`f@`@_^@^^@^.fstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.com- Update to OpenJDK 8u372 build 07 with OpenJ9 0.38.0 virtual machine - Including Oracle April 2023 CPU changes * CVE-2023-21930 (bsc#1210628), CVE-2023-21937 (bsc#1210631), CVE-2023-21938 (bsc#1210632), CVE-2023-21939 (bsc#1210634), CVE-2023-21954 (bsc#1210635), CVE-2023-21967 (bsc#1210636), CVE-2023-21968 (bsc#1210637) * OpenJ9 specific vulnerability: CVE-2023-2597 (bsc#1211615) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.38- Added patch: * stringop-overflow.patch + disable -Wstringop-overflow and fix build in Factory- Update to OpenJDK 8u362 build 09 with OpenJ9 0.36.0 virtual machine - Including Oracle January 2023 CPU changes CVE-2023-21830 (bsc#1207249), CVE-2023-21843 (bsc#1207248) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.36/- Update to OpenJDK 8u352 build 08 with OpenJ9 0.35.0 virtual machine * Including Oracle October 2022 CPU changes CVE-2022-21619 (bsc#1204473), CVE-2022-21626 (bsc#1204471), CVE-2022-21624 (bsc#1204475), CVE-2022-21628 (bsc#1204472) * Fixes OpenJ9 vulnerability bsc#1204703, CVE-2022-3676 * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.35- Update to OpenJDK 8u345 build 01 with OpenJ9 0.33.0 virtual machine * Including Oracle July 2022 CPU changes CVE-2022-21540 (bsc#1201694), CVE-2022-21541 (bsc#1201692), CVE-2022-34169 (bsc#1201684) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.33 - Modified template patch: * openj9-nogit.patch.in + The git commit hash code became more generic, so redo the template patch - Added patch: * openj9-no-narrowing.patch + Fix narrowing conversion error- Update to OpenJDK 8u332 build 09 with OpenJ9 0.32.0 virtual machine * Fixes bsc#1198935, CVE-2021-41041: unverified methods can be invoked using MethodHandles * Including Oracle April 2022 CPU fixes CVE-2022-21426 (bsc#1198672), CVE-2022-21434 (bsc#1198674), CVE-2022-21443 (bsc#1198675), CVE-2022-21476 (bsc#1198671), CVE-2022-21496 (bsc#1198673) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.32- Update to OpenJDK 8u322 build 04 with OpenJ9 0.30.0 virtual machine * including Oracle January 2022 CPU changes CVE-2022-21248 (bsc#1194926), CVE-2022-21277 (bsc#1194930), CVE-2022-21282 (bsc#1194933), CVE-2022-21291 (bsc#1194925), CVE-2022-21293 (bsc#1194935), CVE-2022-21294 (bsc#1194934), CVE-2022-21296 (bsc#1194932), CVE-2022-21299 (bsc#1194931), CVE-2022-21305 (bsc#1194939), CVE-2022-21340 (bsc#1194940), CVE-2022-21341 (bsc#1194941), CVE-2022-21360 (bsc#1194929), CVE-2022-21365 (bsc#1194928), CVE-2022-21366 (bsc#1194927), * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.30 - Added patch: * libdwarf-fix.patch + fix build with different versions of libdwarf- Update to OpenJDK 8u312 build 07 with OpenJ9 0.29.0 virtual machine * including Oracle July 2021 and October 2021 CPU changes CVE-2021-2341 (bsc#1188564), CVE-2021-2369 (bsc#1188565), CVE-2021-2388 (bsc#1188566), CVE-2021-35550 (bsc#1191901), CVE-2021-35565 (bsc#1191909), CVE-2021-35556 (bsc#1191910), CVE-2021-35559 (bsc#1191911), CVE-2021-35561 (bsc#1191912), CVE-2021-35564 (bsc#1191913), CVE-2021-35567 (bsc#1191903), CVE-2021-35578 (bsc#1191904), CVE-2021-35586 (bsc#1191914), CVE-2021-35603 (bsc#1191906) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.29 - Remove the unneeded icedtea-sound provider - Removed patches: * jdk-gcc-warnings.patch * maybe-uninitialized.patch * omr-no-return-in-nonvoid-function.patch + integrated upstream- Remove the forcing of DWARF version 4, since the libdwarf in factory works correctly with this build and DWARF5 symbol format - Expand supported architectures to aarch64- Force DWARF version 4 when building with gcc >= 11 * the internal omr tools set error with debugging information in DWARF5 format * fixes build in factory- Fix version typo in spec file- Update to OpenJDK 8u292 build 10 with OpenJ9 0.26.0 virtual machine * including Oracle April 2021 CPU changes (bsc#1185055, CVE-2021-2163 and bsc#1185056, CVE-2021-2161) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.26 - Added patch: * maybe-uninitialized.patch + initialize variables in constructor + fixes build with newer gcc- Update to OpenJDK 8u282 build 08 with OpenJ9 0.24.0 virtual machine * including Oracle January 2021 CPU changes (bsc#1181239) * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.24 - Modified template patch: * openj9-nogit.patch.in + replace git runs by pre-fetched git hashes in new places + remove hunks that are irrelevant in new sources- Update to OpenJDK 8u272 build 10 with OpenJ9 0.23.0 virtual machine * including Oracle July 2020 CPU changes (bsc#1174157) and October 2020 CPU changes (bsc#1177943) + fixes CVE-2020-14556, CVE-2020-14577, CVE-2020-14578, CVE-2020-14579, CVE-2020-14581, CVE-2020-14583, CVE-2020-14593, CVE-2020-14621, CVE-2020-14779, CVE-2020-14781, CVE-2020-14782, CVE-2020-14792, CVE-2020-14796, CVE-2020-14797, CVE-2020-14798 and CVE-2020-14803 - Removed patch: * gcc10.patch + not needed any more in this version - Modified patches: * java-atk-wrapper-security.patch * openj9-no-werror.patch * system-lcms.patch + rediff to changed context - Added patch: * omr-no-return-in-nonvoid-function.patch + fix build error on some systems- Added patches: * gcc10.patch + Fix dupplicate global pointer variables with gcc 10 + openj9-no-werror.patch + Do not build with warnings as errors the OpenJ9 parts, since that would mean broken build with new warnings from gcc 10- Update to OpenJDK 8u252 build 09 with OpenJ9 0.20.0 virtual machine * including Oracle April 2020 CPU changes (bsc#1169511) + fixes: CVE-2020-2754, CVE-2020-2755, CVE-2020-2756, CVE-2020-2757, CVE-2020-2773, CVE-2020-2781, CVE-2020-2800, CVE-2020-2803, CVE-2020-2805 and CVE-2020-2830 * OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.20- The pack200 and unpack200 alternatives should be slaves of java and not of javac, since they are part of JRE (bsc#1171352).- Initial packaging of OpenJDK 1.8.0_242-b08 with OpenJ9 0.18.1/bin/shsheep51 16917553061.8.0.372-150200.3.33.21.8.0.372-150200.3.33.21.8.0.372-150200.3.33.2accessibility.propertieslibatk-wrapper.soextjava-atk-wrapper.jar/usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib//usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/amd64//usr/lib64/jvm/java-1.8.0-openj9-1.8.0/jre/lib/ext/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:30220/SUSE_SLE-15-SP2_Update/5095f2c92491ddf972c020e0bebd96b0-java-1_8_0-openj9.SUSE_SLE-15-SP2_Updatecpioxz5x86_64-suse-linuxASCII textemptydirectoryIS1 U;.")Dutf-88ff70ba5e3cec17d016d23b2707f995a307c6d5af595b1109720ade3740d80d7?07zXZ !t/?] crv(vX0:h m:*3coV=Z?DzPL(Chӧ,ML_gYe4}\U.D&* ॷ V{Rz%1 @3ޜ:īc_'h(ٴcoa@o;\SpU+;me/8}E5z}\ ^EE϶,jFbz)¤hf)-aj YZ