The following sections summarize changes made in all Java SE 11.0.22 BPR releases. The BPR releases are listed below in date order, most current BPR first. Note that bug fixes in previous BPRs are also included in the current BPR.
BugId | Category | Subcategory | Summary |
---|---|---|---|
JDK-8325580 (not public) | install | install | Remove "alternatives --remove" call from Java rpm installer |
JDK-8325150 | core-libs | java.time | (tz) Update Timezone Data to 2024a |
BugId | Category | Subcategory | Summary |
---|---|---|---|
JDK-8268893 | hotspot | runtime | jcmd to trim the glibc heap |
JDK-8322725 | core-libs | java.time | (tz) Update Timezone Data to 2023d |
Fixes from the prior BPR are included in this version.
January 16, 2024
The full version string for this update release is 11.0.22+9 (where "+" means "build"). The version number is 11.0.22.
For more information, refer to Timezone Data Versions in the Java Runtime.
The security baselines for the Java Runtime at the time of the release of JDK 11.0.22 are specified in the following table:
Java Family Version | Security Baseline (Full Version String) |
---|---|
11 | 11.0.22+9 |
8 | 8u401-b10 |
Oracle recommends that the JDK is updated with each Critical Patch Update. In order to determine if a release is the latest, the Security Baseline page can be used to determine which is the latest version for each release family.
Critical patch updates, which contain security vulnerability fixes, are announced one year in advance on Critical Patch Updates, Security Alerts and Bulletins. It is not recommended that this JDK (version 11.0.22) be used after the next critical patch update scheduled for April 16, 2024.
Java SE Subscription products customers managing JRE updates/installs for large number of desktops should consider using Java Management Service (JMS).
A new system property named org.jcp.xml.dsig.secureValidation
has been added. It can be used to enable or disable the XML Signature secure validation mode. The system property should be set to "true" to enable, or "false" to disable. Any other value for the system property is treated as "false". If the system property is set, it supersedes the XMLCryptoContext
property value.
Secure validation mode is enabled by default if you are running the code with a SecurityManager, otherwise it is disabled by default.
When the C1 compiler is the only compiler available to the VM, it applies loop predication to remove array access range checks from loop bodies. Due to a defect, this optimization was disabled, potentially leading to a performance regression.
This only affects the client VM or VM's running with the non-default command line flags -XX:+NeverActAsServerClassMachine
or -XX:TieredStopAtLevel=[1,2,3]
.
hs-err
and VM.info
(JDK-8251255)
On Linux, process memory information has been added to both JVM crash reports (hs_err
files) and the VM.info
diagnostic jcmd
. This information contains the process' virtual size, its resident set size, and how much memory was swapped out. If the JVM uses glibc
, the size of glibc
outstanding allocations and retained memory are printed, as well as the glibc
tunables.
jdk.jar.maxSignatureFileSize
(JDK-8312489)
The system property, jdk.jar.maxSignatureFileSize
, allows applications to control the maximum size of signature files in a signed JAR. Its default value has been increased from 8000000 bytes (8 MB) to 16000000 bytes (16 MB).
The following root certificates have been added to the cacerts truststore:
+ DigiCert, Inc.
+ digicertcseccrootg5
DN: CN=CN=DigiCert CS ECC P384 Root G5, O="DigiCert, Inc.", C=US
+ DigiCert, Inc.
+ digicertcsrsarootg5
DN: CN=DigiCert CS RSA4096 Root G5, O="DigiCert, Inc.", C=US
+ DigiCert, Inc.
+ digicerttlseccrootg5
DN: DigiCert TLS ECC P384 Root G5, O="DigiCert, Inc.", C=US
+ DigiCert, Inc.
+ digicerttlsrsarootg5
DN: DigiCert TLS RSA4096 Root G5, O="DigiCert, Inc.", C=US
The following root certificates have been added to the cacerts truststore:
+ eMudhra Technologies Limited
+ emsignrootcag1
DN: CN=emSign Root CA - G1, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN
+ eMudhra Technologies Limited
+ emsigneccrootcag3
DN: CN=emSign ECC Root CA - G3, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN
+ eMudhra Technologies Limited
+ emsignrootcag2
DN: CN=emSign Root CA - G2, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN
The following root certificate has been added to the cacerts truststore:
+ Telia Root CA v2
+ teliarootcav2
DN: CN=Telia Root CA v2, O=Telia Finland Oyj, C=FI
The following root certificate has been added to the cacerts truststore:
+ Let's Encrypt
+ letsencryptisrgx2
DN: CN=ISRG Root X2, O=Internet Security Research Group, C=US
X509KeyManager.chooseClientAlias
Once for All Key Types
(JDK-8262186)
The (D)TLS implementation in JDK now calls X509KeyManager.chooseClientAlias()
only once during handshaking for client authentication, even if there are multiple algorithms requested .
This release also contains fixes for security vulnerabilities described in the Oracle Critical Patch Update.
➜ Issues fixed in 11.0.22:
# | JBS | Component | Summary |
---|---|---|---|
1 | JDK-8238436 | client-libs/java.awt | java/awt/Frame/FrameLocationTest/FrameLocationTest.java fails |
2 | JDK-8266421 | client-libs/javax.sound | Deadlock in Sound System |
3 | JDK-8153090 | client-libs/javax.swing | TAB key cannot change input focus after the radio button in the Color Selection dialog |
4 | JDK-8294427 | client-libs/javax.swing | Check boxes and radio buttons have rendering issues on Windows in High DPI env |
5 | JDK-8314263 | core-libs/java.util.logging | Signed jars triggering Logger finder recursion and StackOverflowError |
6 | JDK-8303440 | core-libs/java.util:i18n | The "ZonedDateTime.parse" may not accept the "UTC+XX" zone id |
7 | JDK-8313657 | core-libs/javax.naming | com.sun.jndi.ldap.Connection.cleanup does not close connections on SocketTimeoutErrors |
8 | JDK-8314063 | core-libs/javax.naming | The socket is not closed in Connection::createSocket when the handshake failed for LDAP connection |
9 | JDK-8198540 | core-libs/jdk.nashorn | Dynalink leaks memory when generating type converters |
10 | JDK-8299658 | hotspot/compiler | C1 compilation crashes in LinearScan::resolve_exception_edge |
11 | JDK-8313626 | hotspot/compiler | C2 crash due to unexpected exception control flow |
12 | JDK-8307572 | hotspot/compiler | AArch64: Vector registers are clobbered by some macroassemblers |
13 | JDK-8316178 | hotspot/compiler | Better diagnostic header for CodeBlobs |
14 | JDK-8316514 | hotspot/compiler | Better diagnostic header for VtableStub |
15 | JDK-8292713 | hotspot/compiler | Unsafe.allocateInstance should be intrinsified without UseUnalignedAccesses |
16 | JDK-8244207 | hotspot/compiler | Simplify usage of Compile::print_method() when debugging with gdb and enable its use with rr |
17 | JDK-8313756 | hotspot/compiler | [BACKOUT] 8308682: Enhance AES performance |
18 | JDK-8313760 | hotspot/compiler | [REDO] Enhance AES performance |
19 | JDK-8210265 | hotspot/gc | Crash in HSpaceCounters::update_used() |
20 | JDK-8275333 | hotspot/gc | Print count in "Too many recored phases?" assert |
21 | JDK-8316906 | hotspot/gc | Clarify TLABWasteTargetPercent flag |
22 | JDK-8207200 | hotspot/gc | Committed > max memory usage when getting MemoryUsage |
23 | JDK-8209062 | hotspot/gc | Clean up G1MonitoringSupport |
24 | JDK-8209061 | hotspot/gc | Move G1 serviceability functionality to G1MonitoringSupport |
25 | JDK-8208498 | hotspot/gc | Put archive regions into a first-class HeapRegionSet |
26 | JDK-8263185 | hotspot/runtime | Mallinfo deprecated in glibc 2.33 |
27 | JDK-8320597 | security-libs/java.security | RSA signature verification fails on signed data that does not encode params correctly |
28 | JDK-8302017 | security-libs/java.security | Allocate BadPaddingException only if it will be thrown |
29 | JDK-8313792 | tools/jshell | Verify 4th party information in src/jdk.internal.le/share/legal/jline.md |