-
Latest Version
Java JRE 8 Update 481 LATEST
-
Review by
-
Operating System
Mac OS X 10.7 or later
-
User Rating
Click to vote -
Author / Product
-
Filename
jre-8u481-macosx-x64.dmg
-
MD5 Checksum
d8c31c4dde4dbf45ff72d1061e0b6c26
It is a crucial component of the Java Development Kit (JDK), which is used for developing and running Java applications on all modern computer platforms, including Windows, Mac, and Linux.
By providing a consistent runtime environment, the JRE enables both novice and seasoned developers to write code once and run it on any platform that supports the JRE, without the need for platform-specific code.
This package combines Java code with the required libraries and creates an instance of the Java Virtual Machine (JVM) that executes the resulting program.
This all-in-one approach allows all legacy and modern Java programs to run on any operating system without modification, making the JRE an essential cross-platform compatible tool on the modern market.
One of the primary use cases for this software platform is in the development and execution of Java-based applications. This includes web applications, mobile applications, and desktop applications, as well as applets (plugins or extensions) that run inside web browsers.
Main Features
- Platform-independent runtime environment for Java programs.
- Integration with the Java Development Kit (JDK).
- Support for various Java Virtual Machines (JVMs).
- Dynamic loading of Java classes and resources.
- Integration with development tools and libraries.
- Extensive official and community support.
To install this app platform on a Mac computer, users must follow the instructions presented by the official installer that are distributed on the official Java.com website or here from the secure FileHorse servers.
Since this package integrates deeply inside the OS and provides crucial app execution code for modern browsers, users are required to have administrator privileges to finish the installation procedure.
Users should also be aware that JRE can only run on 64-bit processors (both Intel and Apple Silicon) and that there is no support for single-user basis installation. The package can only be deployed for all users on a Mac.
How to Use
Once installed, the JRE for macOS can be used to run any Java-based application or applet. This can be done by double-clicking the Java file or by opening a terminal window and navigating to the directory containing the Java program.
Users can then execute the program using the Java command followed by the name of the Java class.
The comprehensive help resources for JRE and other Java components are hosted on the official Java website, with extensive community resources hosted all over the web.
User Interface
This app platform does not have a standalone user interface, as it is designed to run in the background and provide resources for Java programs that request them.
However, it may be accessed through the Java Development Kit (JDK) or other development tools that interact with the JRE.
FAQ
What is Java Runtime Environment?
It’s a software layer that provides the necessary resources for Java programs to run on various operating systems.
Is it safe?
Yes. This is a reliable software package used by dozens of millions of users all around the world on all major computer platforms. However, it is essential to install it only from a trusted source to avoid giving an unreliable installer access to administrative privileges.
Alternatives
Python – A popular programming language that comes with its runtime environment called “PyPy”.
Amazon Corretto – A no-cost, production-ready distribution of OpenJDK that provides long-term support and performance enhancements for running Java applications.
Pricing
This product is available to all users for free. It can be downloaded manually as a standalone package, and it also comes as a part of a Java Development Kit (JDK).
System Requirements
This application environment platform requires minimal system resources and can run on all modern and legacy Macs running macOS 10.7.3 (Lion) for Intel processors and macOS 12 for M-series processors.
JRE is optimized only for 64-bit processors, and it also can’t run inside 32-bit web browsers (64-bit Safari is recommended).
PROS
- Platform-independent Java applications environment.
- One of the world’s most popular app software layers.
- Full integration with the Java Development Kit (JDK).
- Comprehensive support for various Java Virtual Machines (JVMs).
- Dynamic loading of Java classes and resources.
- Integration with external development tools and libraries.
- High memory consumption.
- Java Virtual Machine can impact the performance of weaker Mac hardware.
- No native GUI.
The Java Runtime Environment for Mac is an essential tool for both developers and general Mac users who work with Java-based applications.
Its ability to provide a consistent runtime environment across various platforms makes it a valuable asset for creating and executing Java programs, and an essential OS and browser component for users who want to experience the full potential of web content.
Note: Requires 64-bit web browser. Administrator privileges for installation.
Also Available: Download Java Runtime Environment for Windows
What's new in this version:
New Features:
- core-libs/java.rmi
- ➜ Endpoint Identification Enabled By Default for RMI Connections Over TLS (JDK-8341496 (not public))
- RMI will use TLS connections if the [javax.rmi.ssl.SslRMIClientSocketFactory] class is used. These connections now have TLS endpoint identification enabled by default. This may cause some previously-working TLS connections to fail. If this occurs, ensure that the certificate presented by the server has a Subject Alternative Name that matches the server's hostname. Alternatively, endpoint identification for RMI TLS connections can be disabled on the client side by setting the jdk.rmi.ssl.client.enableEndpointIdentification system property to false.
Other Notes:
security-libs/javax.net.ssl➜ Disabled SHA-1 in TLS 1.2 and DTLS 1.2 Handshake Signatures (JDK-8340321):
- The SHA-1 algorithm has been disabled by default in TLS 1.2 and DTLS 1.2 handshake signatures, by adding "rsa_pkcs1_sha1 usage HandshakeSignature, ecdsa_sha1 usage HandshakeSignature, dsa_sha1 usage HandshakeSignature" to the jdk.tls.disabledAlgorithms security property in the java.security config file. RFC 9155 deprecates the use of SHA-1 in TLS 1.2 and DTLS 1.2 digital signatures. Users can, at their own risk, re-enable the SHA-1 algorithm in TLS 1.2 and DTLS 1.2 handshake signatures by removing "rsa_pkcs1_sha1 usage HandshakeSignature, ecdsa_sha1 usage HandshakeSignature, dsa_sha1 usage HandshakeSignature" from the jdk.tls.disabledAlgorithms security property.
install/install➜ Windows Installers to Return to Full Version Directory and Use of Junction (JDK-8310932 (not public)):
- For the JDK11+ LTS families, the JDK will install into a version-specific installation directory by default. The installation directory of 11+ will have a - before the version-specific string to keep consistency with the past 11+ conventions per family. A junction, also known as a symlink for Windows, will also be created in a "latest" directory. It will point to the latest version of that family. Here is a breakdown example of installation and junction locations 11+ families
- Each junction will always point to the latest JDK of the matching LTS family. The junction for each family will be removed when the last JDK of the matching LTS family is uninstalled.
- install/install➜ Make jcmd Command Available in the Headless JDK RPM (JDK-8359443 (not public)):
- jcmd command will be available in the headless JDK RPM instead of the headful JDK RPM.
- It will be added to the java alternatives group instead of the javac alternatives group.
- security-libs/javax.net.ssl➜ Disabled TLS_RSA Cipher Suites (JDK-8245545):
The TLS_RSA cipher suites have been disabled by default, by adding "TLS_RSA_" to the jdk.tls.disabledAlgorithms security property in the java.security configuration file. The TLS_RSA cipher suites do not preserve forward-secrecy and are not commonly used. Some TLS_RSA cipher suites are already disabled because they use DES, 3DES, RC4, or NULL, which are disabled. This action disables all remaining TLS_RSA cipher suites. Any attempts to use cipher suites starting with "TLS_RSA_" will fail with an SSLHandshakeException. Users can, at their own risk, re-enable these cipher suites by removing "TLS_RSA_" from the jdk.tls.disabledAlgorithms security property. The following previously enabled cipher suites are now disabled:
- TLS_RSA_WITH_AES_256_GCM_SHA384
- TLS_RSA_WITH_AES_128_GCM_SHA256
- TLS_RSA_WITH_AES_256_CBC_SHA256
- TLS_RSA_WITH_AES_128_CBC_SHA256
- TLS_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_AES_128_CBC_SHA
- core-libs/java.util:i18n➜ Changes to the Default Time Zone Detection on Debian-based Linux (JDK-8345213):
- On Debian-based Linux distributions such as Ubuntu, the /etc/timezone file was previously used to determine the JDK's default time zone (TimeZone.getDefault()). According to Debian's Wiki, /etc/localtime is now the primary source for the system's default time zone, making /etc/timezone redundant. As a result, the JDK's default time zone detection logic has been updated to use /etc/localtime instead of /etc/timezone. If /etc/localtime and /etc/timezone are inconsistent for any reason, the JDK's default time zone is now determined solely based on /etc/localtime file.
- core-svc/tools➜ jcmd -l and jps Commands Do Not List Java Processes Running in Docker Containers (JDK-8193710):
- The HotSpot runtime code has been updated to allow the jcmd -l and jps commands discover JVMs running in a container.
security-libs/java.security➜ Filter Rules for URIs in the Authority Info Access Extension for Certificates (JDK-8368032 (not public)):
- A new system and security property, com.sun.security.allowedAIALocations, has been introduced. This property allows users the ability to define one or more filtering rules to be applied to URIs obtained from the authority info access extension on X.509 certificates. These filter rules are applied specifically to the CA issuers access method. Any CA issuers URIs in X.509 certificates are only followed when the com.sun.security.enableAIAcaIssuers system property is enabled and the filter allows the URI.
- In order to set the rules, the user must set either the com.sun.security.allowedAIALocations security property or the system property by the same name. If the system property has a value, it will override the security property. By default the property is blank, which enacts a deny-all ruleset.
- For either property, the value consists of a set of space-separated rules that take the form of a URI, with the following constraints:
- The URI must be absolute and hierarchical.
- The URI must only use one of the following schemes: http, https, ldap, or ftp (case-insensitive).
- A hostname or address must be specified and must match (case-insensitive). No name resolution is performed on hostnames to match URIs with IP addresses.
- The port number must match. Where a port number is omitted, the well-known port will be used in the comparison.
For hierarchical schemes (http[s], ftp):
- A rule's normalized path portion of the URI is matched in a case-sensitive manner. If the final component does not end in a slash (/), it is considered to be a file path and must match the CA issuer URI path component. If the rule's path component ends in a slash, then it must match or be a prefix of the CA issuer URI path component. (for example, a filter path of /ab/cd/ will match a CA issuer path of /ab/cd/, /ab/cd/ef and /ab/cd/ef/ghi.).
- Query strings and fragments will be ignored when matching CA issuer URIs.
For ldap URIs:
- The base DN must be an exact match (case-insensitive)
- Any query string in the rule, if specified, will be ignored
Fixed:
- Memory leak in getAllConfigs of awt_GraphicsEnv.c:386
- Enforce limits on the size of an XBM image
- Crashes in getConfigColormap, getConfigVisualId, XVisualIDFromVisual on Linux
- Device.getDisplayMode() doesn't report refresh rate on Linux in case of dual screen
- Cannot list all the available display modes on Ubuntu linux in case of two screen devices
- Memory leak in getAllConfigs of awt_GraphicsEnv.c:585
- java.awt.TextField allows to identify the spaces in a password when double clicked at the starting and end of the text
- java/awt/Frame/FrameLocationTest/FrameLocationTest.java fails
- Cannot resize CheckBoxItemMenu in Synth L&F with setHorizontalTextPosition
- JFileChooser renders file names as HTML document
- JFileChooser in GTK L&F still displays HTML filename
- JPasswordField identifies spaces in password via delete shortcuts
- Right to Left Orientation Issues with MenuItem Component
- Move SimpleSSLContext to jdk/testlibrary
- sun/net/www/protocol/http/RedirectOnPost.java failing
- vmTestbase/gc/lock/malloc/malloclock04/TestDescription.java crashes intermittently
- Solaris: deprecated <pwd.h> and <gid.h> interfaces should be replaced
- Safepoint sync time did not increase
- ClassVerifier::ends_in_athrow() should be removed
- @ignore CheckEBCDICLocaleTest
- NullPointerException in sun.launcher.LauncherHelper.checkJavaFXRemoval
OperaOpera 127.0 Build 5778.14
PhotoshopAdobe Photoshop CC 2026 27.3
OKXOKX - Buy Bitcoin or Ethereum
WPS OfficeWPS Office
Adobe AcrobatAdobe Acrobat Pro 2025.001.21145
MacKeeperMacKeeper 7.4
MalwarebytesMalwarebytes 5.20.0
TradingViewTradingView - Track All Markets
CleanMyMacCleanMyMac X 5.2.10
AdGuard VPNAdGuard VPN for Mac 2.8.2



Comments and User Reviews