java

Enterprise Performance Pack Release Notes

Java™ SE Development Kit 8, Update 481 Enterprise Performance Pack (JDK 8u481-PERF)

Release date: January 20, 2026

The full version string for this update release is 1.8.0_481-perf-b11 (where "b" means "build"). The version number is 1.8.0_481-perf.

 

IANA TZ Data 2025b

For more information, refer to Timezone Data Versions in the JRE Software.

 

Security Baselines

The security baselines for the Java Runtime at the time of the release of JDK 8u481 are specified in the following table:

Java Family Version Security Baseline (Full Version String)
81.8.0_481-perf-b11

 

Keeping the JDK up to Date

Oracle recommends that the JDK is updated with each Critical Patch Update. In order to determine if a release is the latest, the Security Baseline page can be used to determine which is the latest version for each release family.

Critical patch updates, which contain security vulnerability fixes, are announced one year in advance on Critical Patch Updates, Security Alerts and Bulletins. It is not recommended that this JDK (version 8u481) be used after the next critical patch update scheduled for April 21, 2026.

Java Management Service, available to all users, can help you find vulnerable Java versions in your systems. Java SE Subscribers and customers running in Oracle Cloud can use Java Management Service to update Java Runtimes and to do further security reviews like identifying potentially vulnerable third party libraries used by your Java programs. Existing Java Management Service user click here to log in to your dashboard. The Java Management Service Documentation provides a list of features available to everyone and those available only to customers. Learn more about using Java Management Service to monitor and secure your Java Installations.

For systems unable to reach the Oracle Servers, a secondary mechanism expires this JRE (version 8u481) on 2026-05-21. After either condition is met (new release becoming available or expiration date reached), the JRE will provide additional warnings and reminders to users to update to the newer version. For more information, see 23.1.2 JRE Expiration Date in the Java Platform, Standard Edition Deployment Guide.

 

New Features

core-libs/java.rmi
 Endpoint Identification Enabled By Default for RMI Connections Over TLS (JDK-8341496)

RMI will use TLS connections if the javax.rmi.ssl.SslRMIClientSocketFactory class is used. These connections now have TLS endpoint identification enabled by default. This may cause some previously-working TLS connections to fail. If this occurs, ensure that the certificate presented by the server has a Subject Alternative Name that matches the server's hostname. Alternatively, endpoint identification for RMI TLS connections can be disabled on the client side by setting the jdk.rmi.ssl.client.enableEndpointIdentification system property to false.

 

Other Notes

security-libs/javax.net.ssl
 Disabled SHA-1 in TLS 1.2 and DTLS 1.2 Handshake Signatures (JDK-8340321)

The SHA-1 algorithm has been disabled by default in TLS 1.2 and DTLS 1.2 handshake signatures, by adding "rsa_pkcs1_sha1 usage HandshakeSignature, ecdsa_sha1 usage HandshakeSignature, dsa_sha1 usage HandshakeSignature" to the jdk.tls.disabledAlgorithms security property in the java.security config file. RFC 9155 deprecates the use of SHA-1 in TLS 1.2 and DTLS 1.2 digital signatures. Users can, at their own risk, re-enable the SHA-1 algorithm in TLS 1.2 and DTLS 1.2 handshake signatures by removing "rsa_pkcs1_sha1 usage HandshakeSignature, ecdsa_sha1 usage HandshakeSignature, dsa_sha1 usage HandshakeSignature" from the jdk.tls.disabledAlgorithms security property.

security-libs/javax.net.ssl
 Disabled TLS_RSA Cipher Suites (JDK-8245545)

The TLS_RSA cipher suites have been disabled by default, by adding TLS_RSA_* to the jdk.tls.disabledAlgorithms security property in the java.security configuration file. The TLS_RSA cipher suites do not preserve forward-secrecy and are not commonly used. Some TLS_RSA cipher suites are already disabled because they use DES, 3DES, RC4, or NULL, which are disabled. This action disables all remaining TLS_RSA cipher suites. Any attempts to use cipher suites starting with TLS_RSA_ will fail with an SSLHandshakeException. Users can, at their own risk, re-enable these cipher suites by removing TLS_RSA_* from the jdk.tls.disabledAlgorithms security property. The following previously enabled cipher suites are now disabled:


    TLS_RSA_WITH_AES_256_GCM_SHA384
    TLS_RSA_WITH_AES_128_GCM_SHA256
    TLS_RSA_WITH_AES_256_CBC_SHA256
    TLS_RSA_WITH_AES_128_CBC_SHA256
    TLS_RSA_WITH_AES_256_CBC_SHA
    TLS_RSA_WITH_AES_128_CBC_SHA

core-svc/tools
 jcmd -l and jps Commands Do Not List Java Processes Running in Docker Containers (JDK-8193710)

The HotSpot runtime code has been updated to allow the jcmd -l and jps commands discover JVMs running in a container.

install/install
 Windows Installers to Return to Full Version Directory and Use of Junction (JDK-8310932 (not public))

For the JDK11+ LTS families, the JDK will install into a version-specific installation directory by default. The installation directory of 11+ will have a - before the version-specific string to keep consistency with the past 11+ conventions per family. A junction, also known as a symlink for Windows, will also be created in a "latest" directory. It will point to the latest version of that family. Here is a breakdown example of installation and junction locations 11+ families:

Version Installation Directory Junction Location
jdk25.0.2 C:\Program Files\Java\jdk-25.0.2 C:\Program Files\Java\latest\jdk-25
jdk17.0.18 C:\Program Files\Java\jdk-17.0.18 C:\Program Files\Java\latest\jdk-17
jdk11.0.30 C:\Program Files\Java\jdk-11.0.30 C:\Program Files\Java\latest\jdk-11

Each junction will always point to the latest JDK of the matching LTS family. The junction for each family will be removed when the last JDK of the matching LTS family is uninstalled.

security-libs/java.security
 Filter Rules for URIs in the Authority Info Access Extension for Certificates (JDK-8368032 (not public))

A new system and security property, com.sun.security.allowedAIALocations, has been introduced. This property allows users the ability to define one or more filtering rules to be applied to URIs obtained from the authority info access extension on X.509 certificates. These filter rules are applied specifically to the CA issuers access method. Any CA issuers URIs in X.509 certificates are only followed when the com.sun.security.enableAIAcaIssuers system property is enabled and the filter allows the URI.

In order to set the rules, the user must set either the com.sun.security.allowedAIALocations security property or the system property by the same name. If the system property has a value, it will override the security property. By default the property is blank, which enacts a deny-all ruleset.

For either property, the value consists of a set of space-separated rules that take the form of a URI, with the following constraints:

  • The URI must be absolute and hierarchical.
  • The URI must only use one of the following schemes: http, https, ldap, or ftp (case-insensitive).
  • A hostname or address must be specified and must match (case-insensitive). No name resolution is performed on hostnames to match URIs with IP addresses.
  • The port number must match. Where a port number is omitted, the well-known port will be used in the comparison.
  • For hierarchical schemes (http[s], ftp):
    • A rule's normalized path portion of the URI is matched in a case-sensitive manner. If the final component does not end in a slash (/), it is considered to be a file path and must match the CA issuer URI path component. If the rule's path component ends in a slash, then it must match or be a prefix of the CA issuer URI path component. (for example, a filter path of /ab/cd/ will match a CA issuer path of /ab/cd/, /ab/cd/ef and /ab/cd/ef/ghi.).
    • Query strings and fragments will be ignored when matching CA issuer URIs.
  • For ldap URIs:
    • The base DN must be an exact match (case-insensitive).
    • Any query string in the rule, if specified, will be ignored.

For the properties, a single value of "any" (case-insensitive) will create an allow-all rule.

 

Changes in Java SE 8u481-Perf

Bug Fixes

JDK 8u481 Enterprise Performance Pack includes the following fixes from JDK 17:
# BugId Component Summary
1JDK-8328085hotspot/compilerC2: Use after free in PhaseChaitin::Register_Allocate()
2JDK-8364993hotspot/jfrJFR: Disable jdk.ModuleExport in default.jfc
3JDK-8364556hotspot/jfrJFR: Disable SymbolTableStatistics and StringTableStatistics in default.jfc
4JDK-8369992hotspot/jfrJFR: Disable Placeholder-, LoaderConstraints- and ProtectionDomainCacheTableStatistics in default.jfc
5JDK-8328997hotspot/runtimeRemove unnecessary template parameter lists in GrowableArray
6JDK-8317132hotspot/runtimePrepare HotSpot for permissive-
7JDK-8361447hotspot/runtime[REDO] Checked version of JNI Release<type>ArrayElements needs to filter out known wrapped arrays
8JDK-8364235hotspot/runtimeFix for JDK-8361447 breaks the alignment requirements for GuardedMemory
9JDK-8364660hotspot/runtimeClassVerifier::ends_in_athrow() should be removed