Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
01_EnableBsfAdapter_buildXml.patch | Build without the BSF adapter. | Wolfgang Baer <WBaer@gmx.de> | no | |||
02_GNUvms_workaround.patch | Insert a work around for GNU JVMs to use an AWT based GUI instead of swing. | Wolfgang Baer <WBaer@gmx.de> | no | |||
04_fix_typo.patch | Fixes a typo. | Niels Thykier <niels@thykier.net> | no | |||
05_link_javadoc.patch | Link the Javadoc against system installed javadocs. | Niels Thykier <niels@thykier.net> | no | |||
CVE-2016-2510.patch | CVE-2016-2510 An application that includes BeanShell on the classpath may be vulnerable if another part of the application uses Java serialization or XStream to deserialize data from an untrusted source. A vulnerable application could be exploited for remote code execution, including executing arbitrary shell commands. https://github.com/beanshell/beanshell/commit/7c68fde2d6fc65e362f20863d868c112a90a9b49 https://github.com/beanshell/beanshell/commit/1ccc66bb693d4e46a34a904db8eeff07808d2ced |
Markus Koschany <apo@debian.org> | no | 2016-02-26 | ||
07_java9_compatibility.patch | Fixes the build failure with Java 9 | Emmanuel Bourg <ebourg@apache.org> | no |