Questo contenuto non è disponibile nella lingua selezionata.
Chapter 3. Red Hat build of OpenJDK 11.0.20.1 release notes
Review the following release notes for an overview of the changes from the Red Hat build of OpenJDK 11.0.20.1 patch release.
For all the other changes and security fixes, see OpenJDK 11.0.20.1 Released.
Fixed Invalid CEN header error on valid .zip files
Red Hat build of OpenJDK 11.0.20 introduced additional validation checks on the ZIP64 fields of .zip files (JDK-8302483). However, these additional checks caused validation failures on some valid .zip files with the following error message: Invalid CEN header (invalid zip64 extra data field size).
To fix this issue, Red Hat build of OpenJDK 11.0.20.1 supports zero-length headers and the additional padding that some ZIP64 creation tools produce. From Red Hat build of OpenJDK 11.0.20 onward, you can disable these checks by setting the jdk.util.zip.disableZip64ExtraFieldValidation system property to true.
See JDK-8313765 (JDK Bug System)
Increased default value of jdk.jar.maxSignatureFileSize system property
Red Hat build of OpenJDK 11.0.20 introduced a jdk.jar.maxSignatureFileSize system property for configuring the maximum number of bytes that are allowed for the signature-related files in a Java archive (JAR) file (JDK-8300596). By default, the jdk.jar.maxSignatureFileSize property was set to 8000000 bytes (8 MB), which was too small for some JAR files.
Red Hat build of OpenJDK 11.0.20.1 increases the default value of the jdk.jar.maxSignatureFileSize property to 16000000 bytes (16 MB).
See JDK-8313216 (JDK Bug System)
Fixed NullPointerException when handling null addresses
In Red Hat build of OpenJDK 11.0.20, when the serviceability agent encountered null addresses while generating thread dumps, the serviceability agent produced a NullPointerException.
Red Hat build of OpenJDK 11.0.20.1 handles null addresses appropriately.
See JDK-8243210 (JDK Bug System)
Advisories related to Red Hat build of OpenJDK 11.0.20.1
The following advisories have been issued about bug fixes and CVE fixes included in this release: