The JRE expires whenever a new release with security vulnerability fixes becomes available. Critical patch updates, which contain security vulnerability fixes, are announced one year in advance on Critical Patch Updates, Security Alerts and Third Party Bulletin. This JRE (version 7u71) will expire with the release of the next critical patch update scheduled for January 20, 2015.
For systems unable to reach the Oracle Servers, a secondary mechanism expires this JRE (version 7u71) on February 20, 2015. After either condition is met (new release becoming available or expiration date reached), the JRE will provide additional warnings and reminders to users to update to the newer version. For more information, see JRE Expiration Date.
JavaFX Release Notes
This JDK release includes JavaFX version 2.2.71.
Selecting a Suitable JDK 7 Release
In this release, both JDK 7u71 and JDK 7u72 products are available. JDK 7u71 (CPU) contains vulnerability fixes and JDK 7u72 (PSU) contains all of the fixes from 7u71 plus some additional non-critical stability fixes.
Use JDK 7u71 release unless you need one of the additional fixes found on the JDK 7u72 release. For mission critical applications you should test with the PSU release regardless of whether you chose to use the CPU or the PSU as the fixes on the PSU will be included in the next CPU.
Instructions to disable SSL v3.0 in Oracle JDK and JRE
Unsafe Server Certificate Change in SSL/TLS Renegotiations Not Allowed.
Starting with JDK 7u71, unsafe server certificate change in SSL/TLS renegotiations is not allowed by default. Server certificate change in an SSL/TLS renegotiation may be unsafe and should be restricted:
if endpoint identification is not enabled in an SSL/TLS handshaking; and
if the previous handshake is a session-resumption abbreviated initial handshake; and
the identities represented by both certificates (in previous handshake and this handshake) cannot be regraded as the same.
If unsafe server certificate change is really required, please set the system property, jdk.tls.allowUnsafeServerCertChange, to "true" before JSSE is initialized. Note that this would re-establish the unsafe server certificate change issue.