Your search did not match any results.
We suggest you try the following to help find what you’re looking for:
July 16, 2019
The full version string for this update release is 11.0.4+10 (where "+" means "build"). The version number is 11.0.4.
JDK 11.0.4 contains IANA time zone data version 2018i. For more information, refer to Timezone Data Versions in the JRE Software.
The security baselines for the Java Runtime Environment (JRE) at the time of the release of JDK 11.0.4 are specified in the following table:
|JRE Family Version||JRE Security Baseline
(Full Version String)
The JDK expires whenever a new release with security vulnerability fixes becomes available. Critical patch updates, which contain security vulnerability fixes, are announced one year in advance on Critical Patch Updates, Security Alerts and Bulletins. This JDK (version 11.0.4) will expire with the release of the next critical patch update scheduled for October 15, 2019.
Prior to this fix, Windows Server 2019 was recognized as "Windows Server 2016", which produced incorrect values in the
os.name system property and the
Two DocuSign root CA certificates are expired and have been removed from the
alias name "certplusclass2primaryca [jdk]"
Distinguished Name: CN=Class 2 Primary CA, O=Certplus, C=FR
alias name "certplusclass3pprimaryca [jdk]"
Distinguished Name: CN=Class 3P Primary CA, O=Certplus, C=FR
Two Comodo root CA certificates are expired and have been removed from the
alias name "utnuserfirstclientauthemailca [jdk]"
Distinguished Name: CN=UTN-USERFirst-Client Authentication and Email, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US
alias name "utnuserfirsthardwareca [jdk]"
Distinguished Name: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US
The T-Systems Deutsche Telekom Root CA 2 certificate is expired and has been removed from the
alias name "deutschetelekomrootca2 [jdk]"
Distinguished Name: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE
The GTE CyberTrust Global Root certificate is expired and has been removed from the
alias name "gtecybertrustglobalca [jdk]"
Distinguished Name: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US
➜ com.sun.org.apache.xml.internal.security.ignoreLineBreaks System Property
Apache Santuario libraries upgrade introduced a behavioral change where XML signature using Base64 encoding resulted in appending
to the encoded output. This behavioral change was made in the Apache Santuario codebase to comply with RFC 2045. The Santuario team has adopted a position of keeping their libraries compliant with RFC 2045.
com.sun.org.apache.xml.internal.security.ignoreLineBreaks system property to
true can be used to revert this behavioral change by ignoring the newline character(
) and carriage return character(
) from the encoded output.
Additional information can be found at https://issues.apache.org/jira/browse/SANTUARIO-482.
A new boolean system property,
jdk.security.useLegacyECC, has been introduced that enables switching between implementations of ECC.
When the system property,
jdk.security.useLegacyECC, is set to "true" (the value is case-insensitive) the JDK uses the old, native implementation of ECC. If the option is set to an empty string, it is treated as if it were set to "true". This makes it possible to specify
in the command line.
If the option is explicitly set to "false", the provider decides which implementation of ECC is used.
The default value of the option is "true". Note that the default value might change in a future update release of the JDK.
JDK-8217763 (not public)
This release also contains fixes for security vulnerabilities described in the Oracle Critical Patch Update. For a more complete list of the bug fixes included in this release, see the JDK 11.0.4 Bug Fixes page.