RELEASE NOTES FOR: 8u144 ==================================================================================================== Notes generated: Mon Apr 01 15:24:30 CEST 2024 Hint: Prefix bug IDs with https://bugs.openjdk.org/browse/ to reach the relevant JIRA entry. JAVA ENHANCEMENT PROPOSALS (JEP): None. RELEASE NOTES: security-libs/java.security: JDK-8184993: java.util.zip.ZipFile.getEntry() now always returns the ZipEntry instance with a '/' ended entry name for directory entry The `java.util.zip.ZipEntry` API doc specifies "A directory entry is defined to be one whose name ends with a '/'". However, in previous JDK releases `java.util.zip.ZipFile.getEntry(String entryName)` may return a `ZipEntry` instance with an entry name that does not end with '/' for an existing zip directory entry when: * the passed in argument `entryName` does not end with a '/', and * there is a matching zip directory entry with name `entryName` + '/' in the zip file. With this release, the name of the `ZipEntry` instance returned from `java.util.zip.ZipFile.getEntry()` always ends with '/' for any zip directory entry. To revert to the previous behavior, set the system property `jdk.util.zip.ensureTrailingSlash` to "false". This change was made in order to fix a regression introduced in JDK 8u141 when verifying signed JARs and has caused some WebStart applications to fail to load. See JDK-8184993 for more information. ALL FIXED ISSUES, BY COMPONENT AND PRIORITY: core-libs/java.net: (P3) JDK-8184328: JDK 8u131 socketRead0 hang at SSL read deploy/webstart: (P3) JDK-8074544: webstart app fails with CouldNotLoadArgumentException when account in Japanese hotspot/compiler: (P2) JDK-8158639: C2 compilation fails with SIGSEGV (P2) JDK-8134389: Crash in HotSpot with jvm.dll+0x42b48 ciObjectFactory::create_new_metadata (P4) JDK-8185572: Enable AssumeMP by default on SPARC machines hotspot/gc: (P1) JDK-8180048: Interned string and symbol table leak memory during parallel unlinking security-libs/java.security: (P2) JDK-8184993: Jar file verification failing with SecurityException: digest missing xxx