java

JDK 11.0.23 Release Notes

Java SE 11.0.23 Bundled Patch Release (BPR) - Bug Fixes and Updates

The following sections summarize changes made in all Java SE 11.0.23 BPR releases. The BPR releases are listed below in date order, most current BPR first. Note that bug fixes in previous BPRs are also included in the current BPR.

 

Changes in Java SE 11.0.23.0.1

Release date: April 16, 2024

Fixes from the prior BPR are included in this version.


Java™ SE Development Kit 11.0.23 (JDK 11.0.23)

Release date: April 16, 2024

The full version string for this update release is 11.0.23+7 (where "+" means "build"). The version number is 11.0.23.

 

IANA TZ Data 2024a

JDK 11.0.23 contains IANA time zone data 2024a which contains the following changes:

  • Ittoqqortoormiit, Greenland changes time zones on 2024-03-31.
  • Vostok, Antarctica changed time zones on 2023-12-18.
  • Casey, Antarctica changed time zones five times since 2020.
  • Code and data fixes for Palestine timestamps starting in 2072.
  • A new data file zonenow.tab for timestamps starting now.
  • Kazakhstan unifies on UTC+5 beginning 2024-03-01.
  • Palestine springs forward a week later after Ramadan.
  • zic no longer pretends to support indefinite-past DST.
  • localtime no longer mishandles Ciudad Juárez in 2422.

For more information, refer to Timezone Data Versions in the JRE Software.

 

Security Baselines

The security baselines for the Java Runtime at the time of the release of JDK 11.0.23 are specified in the following table:

Java Family Version Security Baseline (Full Version String)
1111.0.23+7
88u411-b09

Keeping the JDK up to Date

Oracle recommends that the JDK is updated with each Critical Patch Update. In order to determine if a release is the latest, the Security Baseline page can be used to determine which is the latest version for each release family.

Critical patch updates, which contain security vulnerability fixes, are announced one year in advance on Critical Patch Updates, Security Alerts and Bulletins. It is not recommended that this JDK (version 11.0.23) be used after the next critical patch update scheduled for July 16, 2024.

Java Management Service, available to all users, can help you find vulnerable Java versions in your systems. Java SE Subscribers and customers running in Oracle Cloud can use Java Management Service to update Java Runtimes and to do further security reviews like identifying potentially vulnerable third party libraries used by your Java programs. Existing Java Management Service user click here to log in to your dashboard. The Java Management Service Documentation provides a list of features available to everyone and those available only to customers. Learn more about using Java Management Service to monitor and secure your Java Installations.

 

New Features

security-libs/javax.crypto
 Update XML Security for Java to 3.0.3 (JDK-8319124)

The XML Signature implementation has been updated to Santuario 3.0.3. Support for four new SHA-3 based RSA-MGF1 signature methods have been added: SHA3_224_RSA_MGF1, SHA3_256_RSA_MGF1, SHA3_384_RSA_MGF1, and SHA3_512_RSA_MGF1. While these new algorithm URIs are not defined in javax.xml.crypto.dsig.SignatureMethod in the JDK update releases, they may be represented as string literals in order to be functionally equivalent. SHA-3 hash algorithm support was delivered to JDK 9 via JEP 287. Releases earlier than that may use third party security providers.

Additionally, support for the following EdDSA signatures has been added: ED25519 and ED448. While these new algorithm URIs are not defined in javax.xml.crypto.dsig.SignatureMethod in the JDK Update releases, they may be represented as string literals in order to be functionally equivalent. The JDK supports EdDSA since JDK 15. Releases earlier than that may use 3rd party security providers. One other difference is that the JDK still supports the here() function by default. However, we recommend avoiding the use of the here() function in new signatures and replacing existing signatures that use the here() function. Future versions of the JDK will likely disable, and eventually remove, support for this function, as it cannot be supported using the standard Java XPath API. Users can now disable the here() function by setting the security property jdk.xml.dsig.hereFunctionSupported to "false".

 

Other Notes

client-libs/java.awt
 AWT SystemTray API Is Not Supported on Most Linux Desktops (JDK-8322750)

The java.awt.SystemTray API is used for notifications in a desktop taskbar and may include an icon representing an application. On Linux, the Gnome desktop's own icon support in the taskbar has not worked properly for several years due to a platform bug. This, in turn, has affected the JDK's API, which relies upon that.

Therefore, in accordance with the existing Java SE specification, java.awt.SystemTray.isSupported() will return false where ever the JDK determines the platform bug is likely to be present.

The impact of this is likely to be limited since applications always must check for that support anyway. Additionally, some distros have not supported the SystemTray for several years unless the end-user chooses to install non-bundled desktop extensions.

security-libs/java.security
 Added Certainly R1 and E1 Root Certificates (JDK-8321408)

The following root certificates have been added to the cacerts truststore:

+ Certainly

  + certainlyrootr1
    DN: CN=Certainly Root R1, O=Certainly, C=US
+ Certainly
  + certainlyroote1
    DN: CN=Certainly Root E1, O=Certainly, C=US

security-libs/javax.xml.crypto
 Enable XML Signature Secure Validation Mode by Default (JDK-8259801)

The XML Signature secure validation mode has been enabled by default (previously it was not enabled by default unless running with a security manager). When enabled, validation of XML signatures are subject to stricter checking of algorithms and other constraints as specified by the jdk.xml.dsig.secureValidationPolicy security property.

If necessary, and at their own risk, applications can disable the mode by setting the org.jcp.xml.dsig.secureValidation property to Boolean.FALSE with the DOMValidateContext.setProperty() API.

 

Updates to Third Party Libraries

Library New Version Module JBS
FreeType 2.13.2 java.desktop JDK-8316028
HarfBuzz 8.2.2 java.desktop JDK-8313643
Joni 2.2.1 jdk.scripting.nashorn JDK-8322094
libpng 1.6.40 java.desktop JDK-8316030
Xalan Java 2.7.3 java.xml JDK-8305814
XML Security for Java 3.0.3 java.xml.crypto JDK-8319124

 

Bug Fixes

This release also contains fixes for security vulnerabilities described in the Oracle Critical Patch Update.

Issues fixed in 11.0.23:

# JBS Component Summary
1JDK-8318951client-libs/2dAdditional negative value check in JPEG decoding
2JDK-8301846client-libs/javax.soundInvalid TargetDataLine after screen lock when using JFileChooser or COM library
3JDK-8213478core-libs/java.lang.invokeReduce rebinds when applying repeated filters and conversions
4JDK-8223454core-libs/java.lang.invokeReduce String concatenation shapes by folding initialLengthCoder into last mixer
5JDK-8222852core-libs/java.lang.invokeReduce String concat combinator tree shapes by folding constants into prependers
6JDK-8213035core-libs/java.lang.invokePack MethodHandleInlineStrategy coder and length into a long
7JDK-8212726core-libs/java.lang.invokeReplace some use of drop- and foldArguments with filtering argument combinator in StringConcatFactory
8JDK-8281560core-libs/java.util.regexMatcher.hitEnd returns unexpected results in presence of CANON_EQ flag.
9JDK-8321480core-libs/java.util:i18nISO 4217 Amendment 176 Update
10JDK-8307683hotspot/compilerLoop Predication should not hoist range checks with trap on success projection by negating their condition
11JDK-8309119hotspot/compiler[17u/11u] Redo JDK-8297951: C2: Create skeleton predicates for all If nodes in loop predication
12JDK-8321215hotspot/compilerIncorrect x86 instruction encoding for VSIB addressing mode
13JDK-8236772hotspot/compilerFix build for windows 32-bit after 8212160 and 8234331.
14JDK-8318889hotspot/compilerC2: add bailout after assert Bad graph detected in build_loop_late
15JDK-8317507hotspot/compilerC2 compilation fails with "Exceeded _node_regs array"
16JDK-8213927hotspot/gcG1 ignores AlwaysPreTouch when UseTransparentHugePages is enabled
17JDK-8287113hotspot/jfrJFR: Periodic task thread uses period for method sampling events
18JDK-8322321hotspot/runtimeAdd man page doc for -XX:+VerifySharedSpaces
19JDK-8268893hotspot/runtimejcmd to trim the glibc heap
20JDK-8323243hotspot/runtimeJNI invocation of an abstract instance method corrupts the stack
21JDK-8320208security-libs/java.securityUpdate Public Suffix List to b5bf572
22JDK-8302182security-libs/java.securityUpdate Public Suffix List to 88467c9
23JDK-8307185security-libs/javax.crypto:pkcs11pkcs11 native libraries make JNI calls into java code while holding GC lock
24JDK-8255867security-libs/javax.net.sslSignatureScheme JSSE property does not preserve ordering in handshake messages
25JDK-8284910security-libs/javax.securityBuffer clean in PasswordCallback
26JDK-8318971tools/jarBetter Error Handling for Jar Tool When Processing Non-existent Files
27JDK-8308245tools/javacAdd -proc:full to describe current default annotation processing policy
28JDK-8216408xml/javax.xml.streamXMLStreamWriter setDefaultNamespace(null) throws NullPointerException
29JDK-8223291xml/javax.xml.transformWhitespace is added to CDATA tags when using OutputKeys.INDENT to format XML
30JDK-8237456xml/javax.xml.transformTransform filtered through SAX filter mishandles character entities
31JDK-8265073xml/javax.xml.transformXML transformation and indentation when using xml:space
32JDK-8220818xml/javax.xml.validationValidator does not find missing match for keyref error