![]() ![]() Critical patch updates, which contain security vulnerability fixes, are announced one year in advance on Critical Patch Updates, Security Alerts and Third Party Bulletin. The JRE expires whenever a new release with security vulnerability fixes becomes available. JRE Security Baseline (Full Version String) Please note that fixes from the prior BPR (8u77 b31) are included in this version. Upgrade production compilers on Windows to Visual Studio 2013 SP4 JRE crash in .URLLoader.twkDidFinishLoading ![]() JavaFX WebView performance regression when inserting html via javascript WebView leaks memory when containing object acts as javascript callback handler Validation of new behaviour for JS callback memory leakĬrash in RuntimeObject::put when object passed to JSObject::setMember is GCed JVM crash while using JavaFW WebView and colgroup/cols html featureĭefer image decoding until WebCore requests ImageFrameĬrash in ResourceLoader::releaseResources()Ĭall JavaScriptCore GC whenever JVM GC happens Intermittent crash when disposing MediaPlayer JEditorPane.createEditorKitForContentType throws NPE after 6882559 Math.pow yields different results upon repeated calls System property 'user.dir' now set to '' value rather than user's working directoryĪpplication started using javaws now starts in rather than current directory New JEditorPane("text/plain","") fails for null context class loader
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |