Release notes for Red Hat build of OpenJDK 17.0.15


Red Hat build of OpenJDK 17

Red Hat Customer Content Services

Abstract

The Release notes for Red Hat build of OpenJDK 17.0.15 document provides an overview of new features in Red Hat build of OpenJDK 17 and a list of potential known issues and possible workarounds.

Preface

Open Java Development Kit (OpenJDK) is a free and open source implementation of the Java Platform, Standard Edition (Java SE). The Red Hat build of OpenJDK is available in four versions: 8u, 11u, 17u, and 21u.

Packages for the Red Hat build of OpenJDK are made available on Red Hat Enterprise Linux and Microsoft Windows and shipped as a JDK and JRE in the Red Hat Ecosystem Catalog.

To report an error or to improve our documentation, log in to your Red Hat Jira account and submit an issue. If you do not have a Red Hat Jira account, then you will be prompted to create an account.

Procedure

  1. Click the following link to create a ticket.
  2. Enter a brief description of the issue in the Summary.
  3. Provide a detailed description of the issue or enhancement in the Description. Include a URL to where the issue occurs in the documentation.
  4. Clicking Create creates and routes the issue to the appropriate documentation team.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.

Red Hat will support select major versions of Red Hat build of OpenJDK in its products. For consistency, these versions remain similar to Oracle JDK versions that are designated as long-term support (LTS).

A major version of Red Hat build of OpenJDK will be supported for a minimum of six years from the time that version is first introduced. For more information, see the OpenJDK Life Cycle and Support Policy.

Note

RHEL 6 reached the end of life in November 2020. Because of this, Red Hat build of OpenJDK is not supporting RHEL 6 as a supported configuration.

Chapter 2. Differences from upstream OpenJDK 17

Red Hat build of OpenJDK in Red Hat Enterprise Linux contains a number of structural changes from the upstream distribution of OpenJDK. The Microsoft Windows version of Red Hat build of OpenJDK attempts to follow Red Hat Enterprise Linux updates as closely as possible.

The following list details the most notable Red Hat build of OpenJDK 17 changes:

  • FIPS support. Red Hat build of OpenJDK 17 automatically detects whether RHEL is in FIPS mode and automatically configures Red Hat build of OpenJDK 17 to operate in that mode. This change does not apply to Red Hat build of OpenJDK builds for Microsoft Windows.
  • Cryptographic policy support. Red Hat build of OpenJDK 17 obtains the list of enabled cryptographic algorithms and key size constraints from the RHEL system configuration. These configuration components are used by the Transport Layer Security (TLS) encryption protocol, the certificate path validation, and any signed JARs. You can set different security profiles to balance safety and compatibility. This change does not apply to Red Hat build of OpenJDK builds for Microsoft Windows.
  • Red Hat build of OpenJDK on RHEL dynamically links against native libraries such as zlib for archive format support and libjpeg-turbo, libpng, and giflib for image support. RHEL also dynamically links against Harfbuzz and Freetype for font rendering and management. This change does not apply to Red Hat build of OpenJDK builds for Microsoft Windows.
  • The src.zip file includes the source for all of the JAR libraries shipped with Red Hat build of OpenJDK.
  • Red Hat build of OpenJDK on RHEL uses system-wide timezone data files as a source for timezone information.
  • Red Hat build of OpenJDK on RHEL uses system-wide CA certificates.
  • Red Hat build of OpenJDK on Microsoft Windows includes the latest available timezone data from RHEL.
  • Red Hat build of OpenJDK on Microsoft Windows uses the latest available CA certificate from RHEL.

Chapter 3. Red Hat build of OpenJDK features

The latest Red Hat build of OpenJDK 17 release might include new features. Additionally, the latest release might enhance, deprecate, or remove features that originated from earlier Red Hat build of OpenJDK 17 releases.

Note

For all the other changes and security fixes, see OpenJDK 17.0.15 Released.

Red Hat build of OpenJDK enhancements

Red Hat build of OpenJDK 17 provides enhancements to features originally created in earlier releases of Red Hat build of OpenJDK.

Warnings from jarsigner tool about removed file entries

In earlier Red Hat build of OpenJDK releases, when a file was removed from a signed JAR file but the file signature was still present, the jarsigner tool did not detect this situation.

In Red Hat build of OpenJDK 17.0.15, you can use the jarsigner ‑verify command to check that every signature has a matching file entry. If any mismatch exists, this command prints a warning. To display the names of any mismatched entries, add the ‑verbose option to the command.

See JDK-8309841 (JDK Bug System).

Distrust of TLS server certificates issued after 15 April 2025 and anchored by Camerfirma root CAs

In accordance with similar plans that Google, Mozilla, Apple, and Microsoft recently announced, Red Hat build of OpenJDK 17.0.15 distrusts TLS certificates that are issued after 15 April 2025 and anchored by Camerfirma root certificates.

Red Hat build of OpenJDK will continue to trust certificates that are issued on or before 15 April 2025 until these certificates expire.

If a server’s certificate chain is anchored by an affected certificate, any attempts to negotiate a TLS session now fail with an exception to indicate that the trust anchor is not trusted. For example:

TLS server certificate issued after 2025-04-15 and anchored by a distrusted legacy Camerfirma root CA: CN=Chambers of Commerce Root -
2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU
Copy to Clipboard Toggle word wrap

You can check whether this change affects a certificate in a JDK keystore by using the following keytool command:

keytool -v -list -alias <your_server_alias> -keystore <your_keystore_filename>

If this change affects any certificate in the chain, update this certificate or contact the organisation that is responsible for managing the certificate.

If you want to continue using TLS server certificates that are anchored by Camerfirma root certificates, you can remove CAMERFIRMA_TLS from the jdk.security.caDistrustPolicies security property either by modifying the java.security configuration file or by using the java.security.properties system property.

Note

Continued use of the distrusted TLS server certificates is at your own risk.

These restrictions apply to the following Camerfirma root certificates that Red Hat build of OpenJDK includes:

Certificate 1
  • Alias name: camerfirmachamberscommerceca [jdk]
  • Distinguished name: CN=Chambers of Commerce Root OU=http://www.chambersign.org O=AC Camerfirma SA CIF A82743287 C=EU
  • SHA256: 0C:25:8A:12:A5:67:4A:EF:25:F2:8B:A7:DC:FA:EC:EE:A3:48:E5:41:E6:F5:CC:4E:E6:3B:71:B3:61:60:6A:C3
Certificate 2
  • Alias name: camerfirmachambersca [jdk]
  • Distinguished name: CN=Chambers of Commerce Root - 2008 O=AC Camerfirma S.A. SERIALNUMBER=A82743287 L=Madrid (see current address at www.camerfirma.com/address) C=EU
  • SHA256: 06:3E:4A:FA:C4:91:DF:D3:32:F3:08:9B:85:42:E9:46:17:D8:93:D7:FE:94:4E:10:A7:93:7E:E2:9D:96:93:C0
Certificate 3
  • Alias name: camerfirmachambersignca [jdk]
  • Distinguished name: CN=Global Chambersign Root - 2008 O=AC Camerfirma S.A. SERIALNUMBER=A82743287 L=Madrid (see current address at www.camerfirma.com/address) C=EU
  • SHA256: 13:63:35:43:93:34:A7:69:80:16:A0:D3:24:DE:72:28:4E:07:9D:7B:52:20:BB:8F:BD:74:78:16:EE:BE:BA:CA

See JDK-8346587 (JDK Bug System).

Fix for problematic SunPKCS11 provider checks on PKCS11 mechanism

In OpenJDK 14, the SunPKCS11 provider introduced the concept of legacy mechanisms. If a mechanism is using a weak algorithm, the provider determines that this mechanism is legacy and subsequently disables it.

In earlier releases, this behavior was inflexible. For example, you could not override the legacy determination to enable a disabled mechanism. Also, even if encryption was not being used, a mechanism that was being used for signing could be considered legacy and therefore disabled if it had a weak encryption algorithm. Similarly, a weak signing algorithm prevented use of the mechanism as a cipher for encryption or decryption.

Red Hat build of OpenJDK 17.0.15 resolves these issues by introducing the allowLegacy configuration property for the SunPKCS11 provider. You can override the legacy determination by setting the allowLegacy property to true. This property is set to false by default.

From this release onward, the provider also considers the service type when determining legacy status. The provider now checks encryption algorithms only for ciphers and checks signature algorithms only for signatures.

See JDK-8293345 (JDK Bug System).

Fix for JNI_GetCreatedJavaVMs method returing a partially initialized JVM

In earlier Red Hat build of OpenJDK releases, the Java Native Interface (JNI) method jint JNI_GetCreatedJavaVMs(JavaVM **vm_buf, jsize bufLen, jsize *numVMs) might have returned a virtual machine (VM) in the vm_buf array that was still being initialized.

Red Hat build of OpenJDK 17.0.15 resolves this issue by ensuring that the JNI_GetCreatedJavaVMs method returns only fully initialized VMs.

Note

Before using the vm_buf array, ensure that the number of VMs returned in numVMs is greater than zero.

See JDK-8308341 (JDK Bug System).

Enhanced timeouts for OCSP, CRL, and certificate fetch

Red Hat build of OpenJDK 17.0.15 introduces three new configuration properties that provide greater control over the timeouts for Online Certificate Status Protocol (OCSP) connections and certificate retrieval:

  • The com.sun.security.ocsp.readtimeout property specifies the timeout for reading OCSP data. This property is paired with the existing com.sun.security.ocsp.timeout property, which means that you can now set timeouts for reading OCSP data and for the transport layer independently of each other. If you do not specify a value for com.sun.security.ocsp.readtimeout, the JDK uses the value of com.sun.security.ocsp.timeout, as in earlier releases. The default value is 15 seconds.
  • The com.sun.security.cert.timeout property specifies the connection timeout for the download of certificates for certificate authorities. The default value is 15 seconds.
  • The com.sun.security.crl.readtimeout property specifies the timeout for reading certificate revocation list (CRL) data for the download of certificates for certificate authorities. The default value is 15 seconds.
Note

To enable certificate downloads, ensure that the com.sun.security.enableAIAcaIssuers property is set to true.

Red Hat build of OpenJDK 17.0.15 also includes syntax improvements for all four timeout properties. The JDK still requires the value to be a positive decimal integer, but you can now append an optional suffix to indicate the unit: s for seconds, or ms for milliseconds. If you do not specify a suffix, the JDK interprets the value as seconds, as in earlier releases. If you specify anything other than a decimal digit before the suffix, the JDK rejects this value and uses the default value instead. The following are examples of invalid values: -5, 0xA, and 6.2.

See JDK-8179502 (JDK Bug System).

Chapter 4. Advisories related to this release

The following advisories are issued to document bug fixes and CVE fixes included in this release:

Revised on 2025-04-29 11:39:57 UTC

Legal Notice

Copyright © 2025 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.
Back to top
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2025 Red Hat