Hello community,

here is the log from the commit of package java-1_7_0-openjdk for 
openSUSE:Factory checked in at 2015-10-28 17:15:48
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/java-1_7_0-openjdk (Old)
 and      /work/SRC/openSUSE:Factory/.java-1_7_0-openjdk.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "java-1_7_0-openjdk"

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/java-1_7_0-openjdk/java-1_7_0-openjdk-bootstrap.changes
  2015-10-22 12:57:24.000000000 +0200
+++ 
/work/SRC/openSUSE:Factory/.java-1_7_0-openjdk.new/java-1_7_0-openjdk-bootstrap.changes
     2015-10-28 17:15:50.000000000 +0100
@@ -1,0 +2,188 @@
+Fri Oct 23 07:08:41 UTC 2015 - [email protected]
+
+- Update to 2.6.2 - OpenJDK 7u91 (bsc#951376)
+  * Security fixes
+    - S8048030, CVE-2015-4734: Expectations should be consistent
+    - S8068842, CVE-2015-4803: Better JAXP data handling
+    - S8076339, CVE-2015-4903: Better handling of remote object
+      invocation
+    - S8076383, CVE-2015-4835: Better CORBA exception handling
+    - S8076387, CVE-2015-4882: Better CORBA value handling
+    - S8076392, CVE-2015-4881: Improve IIOPInputStream consistency
+    - S8076413, CVE-2015-4883: Better JRMP message handling
+    - S8078427, CVE-2015-4842: More supportive home environment
+    - S8078440: Safer managed types
+    - S8080541: More direct property handling
+    - S8080688, CVE-2015-4860: Service for DGC services
+    - S8081760: Better group dynamics
+    - S8086092, CVE-2015-4840: More palette improvements
+    - S8086733, CVE-2015-4893: Improve namespace handling
+    - S8087350: Improve array conversions
+    - S8103671, CVE-2015-4805: More objective stream classes
+    - S8103675: Better Binary searches
+    - S8130078, CVE-2015-4911: Document better processing
+    - S8130193, CVE-2015-4806: Improve HTTP connections
+    - S8130864: Better server identity handling
+    - S8130891, CVE-2015-4843: (bf) More direct buffering
+    - S8131291, CVE-2015-4872: Perfect parameter patterning
+    - S8132042, CVE-2015-4844: Preserve layout presentation
+  * Import of OpenJDK 7 u85 build 2
+    - S8133968: Revert 8014464 on OpenJDK 7
+    - S8133993: [TEST_BUG] Make CipherInputStreamExceptions compile
+      on OpenJDK 7
+    - S8134248: Fix recently backported tests to work with OpenJDK
+      7u
+    - S8134610: Mac OS X build fails after July 2015 CPU
+    - S8134618: test/javax/xml/jaxp/transform/8062923/XslSubstringTest.java
+      has bad license header
+  * Import of OpenJDK 7 u91 build 0
+    - S6854417: TESTBUG: java/util/regex/RegExTest.java fails
+      intermittently
+    - S6966259: Make PrincipalName and Realm immutable
+    - S8005226: 
java/rmi/transport/pinClientSocketFactory/PinClientSocketFactory.java
+      fails intermittently
+    - S8014097: add doPrivileged methods with limited privilege
+      scope
+    - S8021191: Add isAuthorized check to limited doPrivileged
+      methods
+    - S8028780: JDK KRB5 module throws OutOfMemoryError when CCache
+      is corrupt
+    - S8064331: JavaSecurityAccess.doIntersectionPrivilege() drops
+      the information about the domain combiner of the stack ACC
+    - S8076506: Increment minor version of HSx for 7u91 and
+      initialize the build number
+    - S8078822: 8068842 fix missed one new file
+      PrimeNumberSequenceGenerator.java
+    - S8079323: Serialization compatibility for Templates: need to
+      exclude Hashtable from serialization
+    - S8087118: Remove missing package from java.security files
+    - S8098547: (tz) Support tzdata2015e
+    - S8130253: ObjectStreamClass.getFields too restrictive
+    - S8133321: (tz) Support tzdata2015f
+    - S8135043: ObjectStreamClass.getField(String) too restrictive
+  * Import of OpenJDK 7 u91 build 1
+    - S8072932: Test fails with java.security.AccessControlException:
+      access denied ("java.security.SecurityPermission"
+      "getDomainCombiner")
+  * Backports
+    - S6880559, PR2674: Enable PKCS11 64-bit windows builds
+    - S6904403, PR2674: assert(f == k->has_finalizer(),"inconsistent
+      has_finalizer") with debug VM
+    - S7011441, PR2674: jndi/ldap/Connection.java needs to avoid
+      spurious wakeup
+    - S7059542, PR2674: JNDI name operations should be locale
+      independent
+    - S7105461, PR2571: Large JTables are not rendered correctly with
+      Xrender pipeline
+    - S7105883, PR2560: JDWP: agent crash if there exists a
+      ThreadGroup with null name
+    - S7107611, PR2674: sun.security.pkcs11.SessionManager is
+      scalability blocker
+    - S7127066, PR2674: Class verifier accepts an invalid class file
+    - S7150092, PR2674: NTLM authentication fail if user specified a
+      different realm
+    - S7150134, PR2571: JCK api/java_awt/Graphics/index.html#DrawLine
+      fails with OOM for jdk8 with XRender pipeline
+    - S7152582, PR2674: PKCS11 tests should use the NSS libraries
+      available in the OS
+    - S7156085, PR2674: ArrayIndexOutOfBoundsException throws in
+      UTF8Reader of SAXParser
+    - S7177045, PR2674: Rework the TestProviderLeak.java regression
+      test, it is too fragile to low memory errors.
+    - S7190945, PR2674: pkcs11 problem loading NSS libs on Ubuntu
+    - S8005226, PR2674: 
java/rmi/transport/pinClientSocketFactory/PinClientSocketFactory.java
+      fails intermittently
+    - S8009438, PR2674: sun/security/pkcs11/Secmod tests failing on
+      Ubuntu 12.04
+    - S8011709, PR2509: [parfait] False positive: memory leak in
+      jdk/src/share/native/sun/font/layout/CanonShaping.cpp
+    - S8012971, PR2674: PKCS11Test hiding exception failures
+    - S8016105, PR2560: Add complementary RETURN_NULL allocation
+      macros in allocation.hpp
+    - S8020424, PR2674: The NSS version should be detected before
+      running crypto tests
+    - S8020443, PR2674: Frame is not created on the specified
+      GraphicsDevice with two monitors
+    - S8021897, PR2560: EXCEPTION_ACCESS_VIOLATION on debugging
+      String.contentEquals()
+    - S8022683, PR2560: JNI GetStringUTFChars should return NULL on
+      allocation failure not abort the VM
+    - S8023052, PR2509: JVM crash in native layout
+    - S8025922, PR2560: JNI access to Strings need to check if the
+      value field is non-null
+    - S8026119. PR2679: Regression test DHEKeySizing.java failing
+      intermittently
+    - S8027624, PR2674: 
com/sun/crypto/provider/KeyFactory/TestProviderLeak.java
+      unstable again
+    - S8033069, PR2674: mouse wheel scroll closes combobox popup
+    - S8035150, PR2674: ShouldNotReachHere() in ConstantPool::copy_entry_to
+    - S8039212, PR2674: SecretKeyBasic.sh needs to avoid NSS libnss3
+      and libsoftokn3 version mismatches
+    - S8042855, PR2509: [parfait] Potential null pointer dereference
+      in IndicLayoutEngine.cpp
+    - S8044364, PR2674: runtime/RedefineFinalizer test fails on windows
+    - S8048353, PR2674: jstack -l crashes VM when a Java mirror for a
+      primitive type is locked
+    - S8050123, PR2674: Incorrect property name documented in CORBA
+      InputStream API
+    - S8056122, PR1896: Upgrade JDK to use LittleCMS 2.6
+    - S8056124, PR2674: Hotspot should use PICL interface to get
+      cacheline size on SPARC
+    - S8057934, PR1896: Upgrade to LittleCMS 2.6 breaks AIX build
+    - S8059200, PR2674: Promoted JDK9 b31 for Solaris-amd64 fails
+      (Error: dl failure on line 744, no picl library) on Solaris 11.1
+    - S8059588, PR2674: deadlock in java/io/PrintStream when verbose
+      java.security.debug flags are set
+    - S8062518, PR2674: AIOBE occurs when accessing to document
+      function in extended function in JAXP
+    - S8062591, PR2674: SPARC PICL causes significantly longer startup
+      times
+    - S8072863, PR2674: Replace fatal() with vm_exit_during_initialization()
+      when an incorrect class is found on the bootclasspath
+    - S8073453, PR2674: Focus doesn't move when pressing Shift + Tab
+      keys
+    - S8074350, PR2674: Support ISO 4217 "Current funds codes" table
+      (A.2)
+    - S8074869, PR2674: C2 code generator can replace -0.0f with
+      +0.0f on Linux
+    - S8075609, PR2674: java.lang.IllegalArgumentException: aContainer
+      is not a focus cycle root of aComponent
+    - S8075773, PR2674: jps running as root fails after the fix of
+      JDK-8050807
+    - S8076040, PR2674: Test 
com/sun/crypto/provider/KeyFactory/TestProviderLeak.java
+      fails with -XX:+UseG1GC
+    - S8076328, PR2679: Enforce key exchange constraints
+    - S8076455, PR2674: IME Composition Window is displayed on
+      incorrect position
+    - S8076968, PR2674: PICL based initialization of L2 cache line
+      size on some SPARC systems is incorrect
+    - S8077102, PR2674: dns_lookup_realm should be false by default
+    - S8077409, PR2674: Drawing deviates when validate() is invoked
+      on java.awt.ScrollPane
+    - S8078113, PR2674: 8011102 changes may cause incorrect results
+    - S8078331, PR1896: Upgrade JDK to use LittleCMS 2.7
+    - S8080012, PR2674: JVM times out with vdbench on SPARC M7-16
+    - S8081392, PR2674: getNodeValue should return 'null' value for
+      Element nodes
+    - S8081470, PR2674: com/sun/jdi tests are failing with "Error.
+      failed to clean up files after test" with jtreg 4.1 b12
+    - S8081756, PR1896: Mastering Matrix Manipulations
+    - S8130297, PR2674: 
com/sun/crypto/provider/KeyFactory/TestProviderLeak.java
+      still failing after JDK-8076040
+    - S8133636, PR2674: [TEST_BUG] Import/add tests for the problem
+      seen in 8076110
+* Bug fixes
+    - PR2512: Reset success following calls in LayoutManager.cpp
+    - PR2557, G390663: Update Gentoo font configuration and allow font
+      directory to be specified 
+    - PR2568: openjdk causes a full desktop crash on RHEL 6 i586
+    - PR2683: AArch64 port has broken Zero on AArch64
+    - PR2684: AArch64 port not selected on architectures where
+      host_cpu != aarch64
+    - PR2686: Add generated Fedora & Gentoo font configurations for
+      bootstrap stage
+* CACAO
+    - PR2652: Set classLoader field in java.lang.Class as expected by
+      JDK
+
+-------------------------------------------------------------------
@@ -13 +201 @@
-- Update to 2.6.1 - OpenJDK 7u85
+- Update to 2.6.1 - OpenJDK 7u85 (bsc#938248)
java-1_7_0-openjdk.changes: same change

Old:
----
  icedtea-2.6.1.tar.xz
  icedtea-2.6.1.tar.xz.sig

New:
----
  icedtea-2.6.2.tar.xz
  icedtea-2.6.2.tar.xz.sig

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ java-1_7_0-openjdk-bootstrap.spec ++++++
--- /var/tmp/diff_new_pack.j066ln/_old  2015-10-28 17:15:55.000000000 +0100
+++ /var/tmp/diff_new_pack.j066ln/_new  2015-10-28 17:15:55.000000000 +0100
@@ -19,7 +19,7 @@
 %{!?aarch64:%global aarch64 aarch64 arm64 armv8}
 %global jit_arches %ix86 x86_64 ppc64 ppc64le %arm %aarch64
 %global test_arches %ix86 x86_64 ppc64 ppc64le
-%global icedtea_version 2.6.1
+%global icedtea_version 2.6.2
 %global icedtea_sound_version 1.0.1
 %global mauvedate 2008-10-22
 %global buildoutputdir openjdk.build/
@@ -31,7 +31,7 @@
 # Standard JPackage naming and versioning defines.
 %global priority        1705
 %global javaver         1.7.0
-%global buildver        85
+%global buildver        91
 # Standard JPackage directories and symbolic links.
 %global sdklnk          java-%{javaver}-openjdk
 %global archname        %{sdklnk}

java-1_7_0-openjdk.spec: same change
++++++ corba.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/corba-2545636482d6/.hgtags 
new/corba-a4d55c5cec23/.hgtags
--- old/corba-2545636482d6/.hgtags      2015-07-19 19:19:26.000000000 +0200
+++ new/corba-a4d55c5cec23/.hgtags      2015-10-21 04:15:30.000000000 +0200
@@ -640,3 +640,9 @@
 02c5cee149d94496124f794b7ef89d860b8710ee jdk7u85-b00
 a1436e2c0aa8c35b4c738004d19549df54448621 jdk7u85-b01
 e3445769412d69411988241bef34fd1d652a37d1 icedtea-2.6-branchpoint
+2545636482d69e70bf482d41ba18dba27798f495 icedtea-2.6.1
+7a91bf11c82bd794b7d6f63187345ebcbe07f37c jdk7u85-b02
+10bb9df77e39518afc9f65e7fdc7328bb0fb80dd icedtea-2.6.2pre01
+0445c54dcfb6cd523525a07eec0f2b26c43eb3c4 icedtea-2.6.2pre02
+f9630ed441a06612f61a88bd3da39075015213a7 jdk7u91-b00
+34be12b4b6ea5f30d364a916a92effeafdce678d jdk7u91-b01
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/corba-2545636482d6/src/share/classes/com/sun/corba/se/impl/io/IIOPInputStream.java
 
new/corba-a4d55c5cec23/src/share/classes/com/sun/corba/se/impl/io/IIOPInputStream.java
--- 
old/corba-2545636482d6/src/share/classes/com/sun/corba/se/impl/io/IIOPInputStream.java
      2015-07-19 19:19:26.000000000 +0200
+++ 
new/corba-a4d55c5cec23/src/share/classes/com/sun/corba/se/impl/io/IIOPInputStream.java
      2015-10-21 04:15:30.000000000 +0200
@@ -567,6 +567,11 @@
                 // XXX I18N, logging needed.
                 throw new NotActiveException("defaultReadObjectDelegate");
 
+            if (!currentClassDesc.forClass().isAssignableFrom(
+                    currentObject.getClass())) {
+                throw new IOException("Object Type mismatch");
+            }
+
             // The array will be null unless fields were retrieved
             // remotely because of a serializable version difference.
             // Bug fix for 4365188.  See the definition of
@@ -1063,6 +1068,9 @@
 
             int spBase = spClass;       // current top of stack
 
+            if (currentClass.getName().equals("java.lang.String")) {
+                return this.readUTF();
+            }
             /* The object's classes should be processed from supertype to 
subtype
              * Push all the clases of the current object onto a stack.
              * Note that only the serializable classes are represented
@@ -2244,6 +2252,27 @@
 
                 try {
                     Class fieldCl = fields[i].getClazz();
+                    if ((objectValue != null)
+                            && (!fieldCl.isAssignableFrom(
+                                    objectValue.getClass()))) {
+                        throw new IllegalArgumentException("Field mismatch");
+                    }
+                   Field classField = null;
+                    try {
+                        classField = cl.getDeclaredField(fields[i].getName());
+                    } catch (NoSuchFieldException nsfEx) {
+                        throw new IllegalArgumentException(nsfEx);
+                    } catch (SecurityException secEx) {
+                        throw new IllegalArgumentException(secEx.getCause());
+                    }
+                    Class<?> declaredFieldClass = classField.getType();
+
+                    // check input field type is a declared field type
+                    // input field is a subclass of the declared field
+                    if (!declaredFieldClass.isAssignableFrom(fieldCl)) {
+                        throw new IllegalArgumentException(
+                                "Field Type mismatch");
+                    }
                     if (objectValue != null && 
!fieldCl.isInstance(objectValue)) {
                         throw new IllegalArgumentException();
                     }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/corba-2545636482d6/src/share/classes/com/sun/corba/se/impl/io/IIOPOutputStream.java
 
new/corba-a4d55c5cec23/src/share/classes/com/sun/corba/se/impl/io/IIOPOutputStream.java
--- 
old/corba-2545636482d6/src/share/classes/com/sun/corba/se/impl/io/IIOPOutputStream.java
     2015-07-19 19:19:26.000000000 +0200
+++ 
new/corba-a4d55c5cec23/src/share/classes/com/sun/corba/se/impl/io/IIOPOutputStream.java
     2015-10-21 04:15:30.000000000 +0200
@@ -559,6 +559,10 @@
              * Push all the clases of the current object onto a stack.
              * Remember the stack pointer where this set of classes is being 
pushed.
              */
+            if 
(currentClassDesc.forClass().getName().equals("java.lang.String")) {
+                    this.writeUTF((String)obj);
+                    return;
+            }
             int stackMark = classDescStack.size();
             try {
                 ObjectStreamClass next;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/corba-2545636482d6/src/share/classes/org/omg/CORBA_2_3/portable/InputStream.java
 
new/corba-a4d55c5cec23/src/share/classes/org/omg/CORBA_2_3/portable/InputStream.java
--- 
old/corba-2545636482d6/src/share/classes/org/omg/CORBA_2_3/portable/InputStream.java
        2015-07-19 19:19:26.000000000 +0200
+++ 
new/corba-a4d55c5cec23/src/share/classes/org/omg/CORBA_2_3/portable/InputStream.java
        2015-10-21 04:15:30.000000000 +0200
@@ -77,7 +77,7 @@
      *
      * throw SecurityException if SecurityManager is installed and
      * enableSubclassImplementation SerializablePermission
-     * is not granted or jdk.corba.allowOutputStreamSubclass system
+     * is not granted or jdk.corba.allowInputStreamSubclass system
      * property is either not set or is set to 'false'
      */
     public InputStream() {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/corba-2545636482d6/src/share/classes/sun/rmi/rmic/iiop/StubGenerator.java 
new/corba-a4d55c5cec23/src/share/classes/sun/rmi/rmic/iiop/StubGenerator.java
--- 
old/corba-2545636482d6/src/share/classes/sun/rmi/rmic/iiop/StubGenerator.java   
    2015-07-19 19:19:26.000000000 +0200
+++ 
new/corba-a4d55c5cec23/src/share/classes/sun/rmi/rmic/iiop/StubGenerator.java   
    2015-10-21 04:15:30.000000000 +0200
@@ -446,6 +446,9 @@
         if (emitPermissionCheck) {
 
             // produce the following generated code
+            //
+            // private transient boolean _instantiated = false;
+            //
             // private static Void checkPermission() {
             // SecurityManager sm = System.getSecurityManager();
             // if (sm != null) {
@@ -460,10 +463,21 @@
             //
             // public _XXXXXX_Stub() {
             // this(checkPermission());
+            // _instantiated = true;
+            // }
+            //
+            // private void readObject(java.io.ObjectInputStream s) throws 
IOException, ClassNotFoundException {
+            //    checkPermission();
+            //    s.defaultReadObject();
+            //    _instantiated = true;
             // }
+            //
             // where XXXXXX is the name of the remote interface
 
                 p.pln();
+                p.plnI("private transient boolean _instantiated = false;");
+                p.pln();
+                p.pO();
                 p.plnI("private static Void checkPermission() {");
                 p.plnI("SecurityManager sm = System.getSecurityManager();");
                 p.pln("if (sm != null) {");
@@ -480,13 +494,23 @@
                 p.pO();
 
                 p.pI();
-                p.pln("private " + currentClass + "(Void ignore) {  }");
+                p.plnI("private " + currentClass + "(Void ignore) {  }");
                 p.pln();
+                p.pO();
 
-                p.plnI("public " + currentClass + "() { ");
+                p.plnI("public " + currentClass + "() {");
                 p.pln("this(checkPermission());");
+                p.pln("_instantiated = true;");
                 p.pOln("}");
                 p.pln();
+                p.plnI("private void readObject(java.io.ObjectInputStream s) 
throws IOException, ClassNotFoundException {");
+                p.plnI("checkPermission();");
+                p.pO();
+                p.pln("s.defaultReadObject();");
+                p.pln("_instantiated = true;");
+                p.pOln("}");
+                p.pln();
+                //p.pO();
         }
 
        if (!emitPermissionCheck) {
@@ -893,6 +917,7 @@
         String paramNames[] = method.getArgumentNames();
         Type returnType = method.getReturnType();
         ValueType[] exceptions = getStubExceptions(method,false);
+        boolean hasIOException = false;
 
         addNamesInUse(method);
         addNameInUse("_type_ids");
@@ -920,6 +945,13 @@
         p.plnI(" {");
 
         // Now create the method body...
+        if (emitPermissionCheck) {
+            p.pln("if ((System.getSecurityManager() != null) && 
(!_instantiated)) {");
+            p.plnI("    throw new java.io.IOError(new 
java.io.IOException(\"InvalidObject \"));");
+            p.pOln("}");
+            p.pln();
+        }
+
 
         if (localStubs) {
             writeLocalStubMethodBody(p,method,theType);

++++++ hotspot.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/java-1_7_0-openjdk/hotspot.tar.bz2 
/work/SRC/openSUSE:Factory/.java-1_7_0-openjdk.new/hotspot.tar.bz2 differ: char 
11, line 1

++++++ icedtea-2.6.1.tar.xz -> icedtea-2.6.2.tar.xz ++++++
++++ 8001 lines of diff (skipped)


++++++ jaxp.tar.bz2 ++++++
++++ 19143 lines of diff (skipped)

++++++ jaxws.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/jaxws-b9776fab65b8/.hgtags 
new/jaxws-14c411b1183c/.hgtags
--- old/jaxws-b9776fab65b8/.hgtags      2015-07-19 19:19:27.000000000 +0200
+++ new/jaxws-14c411b1183c/.hgtags      2015-10-21 04:15:31.000000000 +0200
@@ -640,3 +640,9 @@
 705d613d09cf73a0c583b79268a41cbb32139a5a jdk7u85-b00
 bb46da1a45505cf19360d5a3c0d2b88bb46f7f3b jdk7u85-b01
 299588405837ef1e37f3653127c68261abc0ffdf icedtea-2.6-branchpoint
+b9776fab65b80620f0c8108f255672db037f855c icedtea-2.6.1
+902c8893132eb94b222850e23709f57c4f56e4db jdk7u85-b02
+26d406dd17b150fa1dc15549d67e294d869537dd icedtea-2.6.2pre01
+e8660c5ef3e5cce19f4459009e69270c52629312 icedtea-2.6.2pre02
+8206da0912d36f48b023f983c0a3bd9235c33c12 jdk7u91-b00
+3862008078f83ca7f7c669b1b9d1f0f2e256aad8 jdk7u91-b01

++++++ jdk.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/java-1_7_0-openjdk/jdk.tar.bz2 
/work/SRC/openSUSE:Factory/.java-1_7_0-openjdk.new/jdk.tar.bz2 differ: char 11, 
line 1

++++++ langtools.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/langtools-9c6e1de67d7d/.hgtags 
new/langtools-73356b81c5c7/.hgtags
--- old/langtools-9c6e1de67d7d/.hgtags  2015-07-19 19:20:23.000000000 +0200
+++ new/langtools-73356b81c5c7/.hgtags  2015-10-21 04:15:32.000000000 +0200
@@ -640,3 +640,9 @@
 1b20ca77fa98bb29d1f5601f027b3055e9eb28ee jdk7u85-b00
 dce5a828bdd56d228724f1e9c6253920f613cec5 jdk7u85-b01
 bc95d2472055d96a712db09ecd8ab42e52058481 icedtea-2.6-branchpoint
+9c6e1de67d7d26809d02c8ce3d6629503cb67d19 icedtea-2.6.1
+b22cdae823bac193338d928e86319cd3741ab5fd jdk7u85-b02
+aef681a80dc1e8a8b69c1a06b463bda7999801ea icedtea-2.6.2pre01
+d627a940b6ca8fb4353f844e4f91163a3dcde0bc icedtea-2.6.2pre02
+2741575d96f3985d41de8ebe1ba7fae8afbb0fde jdk7u91-b00
+1a9e2dcc91dc3d0c103b09c478b3ac31ac45733f jdk7u91-b01

++++++ openjdk.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/icedtea7-forest-2-6-39b2c4354d0a/.hgtags 
new/icedtea7-forest-2-6-601ca7147b8c/.hgtags
--- old/icedtea7-forest-2-6-39b2c4354d0a/.hgtags        2015-07-19 
19:19:31.000000000 +0200
+++ new/icedtea7-forest-2-6-601ca7147b8c/.hgtags        2015-10-21 
04:15:30.000000000 +0200
@@ -638,3 +638,9 @@
 e3845b02b0d1bfe203ab4783941d852a2b2d412d jdk7u85-b01
 dbfa75121acab9c4dfbf5b28e3eba0e58905c4ef icedtea-2.6.0
 dbfa75121acab9c4dfbf5b28e3eba0e58905c4ef icedtea-2.6-branchpoint
+39b2c4354d0a235a5bc20ce286374bb242e9c62d icedtea-2.6.1
+bc294917c5eb1ea2e655a2fcbd8fbb2e7cbd3313 jdk7u85-b02
+2265879728d802e3af28bcd9078431c56a0e26e5 icedtea-2.6.2pre01
+d27c76db0808b7a59313916e9880deded3368ed2 icedtea-2.6.2pre02
+63d687368ce5bca36efbe48db2cf26df171b162d jdk7u91-b00
+03b03194afbe87a049a1c6d83f49788602c363d8 jdk7u91-b01


Reply via email to