The full internal version number for this update release is 1.7.0_1-b08 (where "b" means "build"). The external version number is 7u1.
Java SE 7u1 contains Olson time zone data version 2011g. For more information, refer to Timezone Data Versions in the JRE Software .
The security baselines for the Java SE platform at the time of the release of Java SE 7u1 are specified in the following table:
JRE Family Version | Java for Business Security Baseline |
---|---|
7 | 1.7.0_1 |
6 | 1.6.0_29 |
5.0 | 1.5.0_32 |
1.4.2 | 1.4.2_34 |
For more information about security baselines, see Deploying Java Applets With Family JRE Versions in Java Plug-in for Internet Explorer .
The JDK 7 release is co-bundled with the Mozilla Rhino JavaScript engine based on version 1.7R3 pre-release sources with Oracle modifications. You can download the Oracle modified Rhino sources at https://jdk.java.net/.
This update release includes the following new entries to the Blacklist:
Note: For more information see the Blacklist Jar Feature section in the Java SE 6u14 Release Notes.
A bug in the rmiregistry
command included in this release may cause unintended exceptions to be thrown when an RMI server attempts to bind an exported object which includes codebase annotations using the "file:" URL scheme. The RMI servers most likely to be effected are those which are invoked only by RMI clients executing on the same host as the server.
RMI annotates codebase information as part of the serialized state of a remote object reference to assist RMI clients in loading the required classes and interfaces associated with the object at runtime. Exported objects which are looked up in the RMI registry and invoked by RMI clients running on hosts other than the server are usually annotated with codebase URL schemes, such as "http:" or "ftp:" and these should continue to work correctly.
As a workaround, RMI servers can set the java.rmi.server.codebase
property to use codebase URLs other than the "file:" scheme for the objects they export.
This release contains fixes for security vulnerabilities. For more information, please see Oracle Java SE Critical Patch Update advisory.
Three bugs reported by various parties, including Apache Lucene developers, have been fixed in JDK 7 Update 1, in addition to a fourth related bug found by Oracle (7070134, 7068051, 7044738, 7077439).
Bug ID | Category | Sub-Category | Synopsis |
---|---|---|---|
7068051 | hotspot | compiler2 | SIGSEGV in PhaseIdealLoop::build_loop_late_post on T5440 |
7077439 | hotspot | compiler2 | Possible reference through NULL in loopPrdicate.cpp:726 |
7073699 | java_plugin | misc | Include 7067049 in 7u1 |
7068476 | java_plugin | plugin2 | backport fix for 7066067 into 7u1 |
7071371 | java_plugin | plugin2 | include 7068741 in 7u1 |
7075275 | java_plugin | plugin2 | include the fix for 7072601 in 7u1 |