SDK/RTE 1.4.2.28 Release Notes
Table Of Contents
- Table of Contents
- Overview
- Features
- Installation
- Usage Documentation
- Removing support for unwanted architectures in the JRE
- Support for dynamic thread local storage (TLS)
- Signal Chaining Functionality
- Support for C++ applications built with -AA and -AP options (PA-RISC) only
- Using Java 2 JNI on HP-UX
- HotSpot JVM Options
- Garbage collectors: Parallel, Concurrent mark, and Sweep
- Allocating physical memory and swap in the Java heap
- Asian TrueType fonts and Asian locales
- Date/Time methods defaults
- Profiling
- Closing a socket when accept or read is pending (PA-RISC) - new patch information!
- Compatibility with previous releases
- Runtime Plug-In usage and configuration
- GC log-rotation support
- ThreadDumpPath support
- Additional HP and Oracle Java documentation
- Problem Fixes
- PA-RISC Known issues
- Recommend setting PTHREAD_SUSPEND_SYNC to 1 under certain conditions (HP-UX 11.31 (11i v3))
- shl_load HotSpot libjvm problem due to TLS (HP-UX 11.0 PA-RISC)
- 64-bit Support X/Motif (HP-UX 11.00 & 11.11 (11i v1) PA-RISC)
- 64-bit Support - System Call (HP-UX 11.00 PA-RISC)
- /dev/​poll Runtime Support (HP-UX 11.00 & 11.11 (11i v1) PA-RISC)
- HPjconfig Configuration Tool
- Compiler Safe Points (HP-UX 11.00 & 11.11 (11i v1) PA-RISC)
- Using Linker Option +noenvvar and +compat on HP Integrity and PA-64 Systems
- Running Java with setuid or setgid
- HP Integrity (Itanium) Known Issues
- Using pthread_suspend() under certain conditions on HP-UX 11.31 (11i v3)
- Initializing a JVM instance with JNI_CreateJavaVM or attaching to JVM with AttachCurrentThread()
- Using Linker Option +noenvvar and +compat on HP Integrity and PA-64 Systems
- Running Java with setuid or setgid
- Running Aries HP Integrity emulation on PA2.0
- Software Support
- Security fixes in the 1.4.2.28 release

For other problems, refer to SDK & RTE 1.4 product support page at: HP-UX Java
support page.
Security fixes in the 1.4.2.28 release
The following security fix is included in this release.
Table 1 Security Fixes
NoteComponentCVE
See Note 2SoundCVE-2010-4454
See Note 2SoundCVE-2010-4462
See Note 1SwingCVE-2010-4465
See Note 1HotSpotCVE-2010-4469
See Note 2SoundCVE-2010-4473
See Note 5Java LanguageCVE-2010-4476
See Note 1DeploymentCVE-2010-4447
See Note 1DeploymentCVE-2010-4475
See Note 1NetworkingCVE-2010-4448
See Note 32DCVE-2011-0862
See Note 1AWTCVE-2011-0815
See Note 1HotSpotCVE-2011-0864
See Note 2SoundCVE-2011-0802
See Note 2SoundCVE-2011-0814
See Note 1SwingCVE-2011-0871
See Note 1NetworkingCVE-2011-0867
See Note 1DeserializationCVE-2011-0865
See Note 1AWTCVE-2011-3548
See Note 2SoundCVE-2011-3545
See Note 1SwingCVE-2011-3549
See Note 7RMICVE-2011-3556
See Note 7RMICVE-2011-3557
See Note 1JSSECVE-2011-3560
See Note 1NetworkingCVE-2011-3547
26