Notes generated: Mon Nov 04 16:42:19 CET 2024
None.
Issue | Description | ||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
JDK-8337664 |
Distrust TLS Server Certificates Anchored by Entrust Root Certificates and Issued After Nov 11, 2024 The JDK will stop trusting TLS server certificates issued after November 11, 2024 and anchored by Entrust root certificates, in line with similar plans recently announced by Google and Mozilla. The list of affected certificates includes certificates branded as AffirmTrust, which are managed by Entrust. TLS server certificates issued on or before November 11, 2024 will continue to be trusted until they expire. Certificates issued after that date, and anchored by any of the Certificate Authorities in the table below, will be rejected. The restrictions will be enforced in the JDK implementation (the SunJSSE Provider) of the Java Secure Socket Extension (JSSE) API. A TLS session will not be negotiated if the server's certificate chain is anchored by any of the Certificate Authorities in the table below and the certificate has been issued after November 11, 2024. An application will receive an Exception with a message indicating the trust anchor is not trusted, for example:
If necessary, and at your own risk, you can work around the restrictions by removing "ENTRUST_TLS" from the The restrictions are imposed on the following Entrust Root certificates included in the JDK:
You can also use the
If any of the certificates in the chain are issued by one of the root CAs in the table above are listed in the output you will need to update the certificate or contact the organization that manages the server. |
||||||||||||||||||||
JDK-8341059 |
Distrust TLS Server Certificates Anchored by Entrust Root Certificates and Issued After Nov 11, 2024 The JDK will stop trusting TLS server certificates issued after November 11, 2024 and anchored by Entrust root certificates, in line with similar plans recently announced by Google and Mozilla. The list of affected certificates includes certificates branded as AffirmTrust, which are managed by Entrust. TLS server certificates issued on or before November 11, 2024 will continue to be trusted until they expire. Certificates issued after that date, and anchored by any of the Certificate Authorities in the table below, will be rejected. The restrictions will be enforced in the JDK implementation (the SunJSSE Provider) of the Java Secure Socket Extension (JSSE) API. A TLS session will not be negotiated if the server's certificate chain is anchored by any of the Certificate Authorities in the table below and the certificate has been issued after November 11, 2024. An application will receive an Exception with a message indicating the trust anchor is not trusted, for example:
If necessary, and at your own risk, you can work around the restrictions by removing "ENTRUST_TLS" from the The restrictions are imposed on the following Entrust Root certificates included in the JDK:
You can also use the
If any of the certificates in the chain are issued by one of the root CAs in the table above are listed in the output you will need to update the certificate or contact the organization that manages the server. |
Issue | Description |
---|---|
JDK-8341057 |
Added SSL.com TLS Root CA Certificates Issued in 2022 The following root certificates have been added to the cacerts truststore: ``` + SSL.com + ssltlsrootecc2022 DN: CN=SSL.com TLS ECC Root CA 2022, O=SSL Corporation, C=US
|
Priority | Bug | Summary |
---|---|---|
P4 | JDK-8334123 | log the opening of Type 1 fonts |
Priority | Bug | Summary |
---|---|---|
P3 | JDK-6967482 | TAB-key does not work in JTables after selecting details-view in JFileChooser |
P4 | JDK-8166352 | FilePane.createDetailsView() removes JTable TAB, SHIFT-TAB functionality |
Priority | Bug | Summary |
---|---|---|
P3 | JDK-8338696 | (fs) BasicFileAttributes.creationTime() falls back to epoch if birth time is unavailable (Linux) |
P4 | JDK-8299813 | java/nio/channels/DatagramChannel/Disconnect.java fails with jtreg test timeout due to lost datagram |
P4 | JDK-8336301 | test/jdk/java/nio/channels/AsyncCloseAndInterrupt.java leaves around a FIFO file upon test completion |
Priority | Bug | Summary |
---|---|---|
P4 | JDK-8333652 | RISC-V: compiler/vectorapi/VectorGatherMaskFoldingTest.java fails when using RVV |
P5 | JDK-8335536 | Fix assertion failure in IdealGraphPrinter when append is true |
Priority | Bug | Summary |
---|---|---|
P4 | JDK-8333716 | Shenandoah: Check for disarmed method before taking the nmethod lock |
P4 | JDK-8331411 | Shenandoah: Reconsider spinning duration in ShenandoahLock |
Priority | Bug | Summary |
---|---|---|
P4 | JDK-8335775 | Remove extraneous 's' in comment of rawmonitor.cpp test file |
Priority | Bug | Summary |
---|---|---|
P4 | JDK-8334239 | Introduce macro for ubsan method/function exclusions |
P4 | JDK-8332818 | ubsan: archiveHeapLoader.cpp:70:27: runtime error: applying non-zero offset 18446744073707454464 to null pointer |
P4 | JDK-8333887 | ubsan: unsafe.cpp:247:13: runtime error: store to null pointer of type 'volatile int' |
Priority | Bug | Summary |
---|---|---|
P4 | JDK-8334041 | Bump version numbers for 23.0.1 |
Priority | Bug | Summary |
---|---|---|
P4 | JDK-8333676 | JCK_RETRY_COUNT appears to not work |
Priority | Bug | Summary |
---|---|---|
P2 | JDK-8341057 | Add 2 SSL.com TLS roots |
Priority | Bug | Summary |
---|---|---|
P2 | JDK-8341059 | Change Entrust TLS distrust date to November 12, 2024 |
P3 | JDK-8337664 | Distrust TLS server certificates issued after Oct 2024 and anchored by Entrust Root CAs |
P4 | JDK-8332524 | Instead of printing "TLSv1.3," it is showing "TLS13" |
Priority | Bug | Summary |
---|---|---|
P4 | JDK-8325525 | Create jtreg test case for JDK-8325203 |