이 콘텐츠는 선택한 언어로 제공되지 않습니다.
Release notes for Red Hat build of OpenJDK 11.0.27
Abstract
Preface
Open Java Development Kit (OpenJDK) is a free and open source implementation of the Java Platform, Standard Edition (Java SE). The Red Hat build of OpenJDK is available in four versions: 8u, 11u, 17u, and 21u.
Packages for the Red Hat build of OpenJDK are made available on Red Hat Enterprise Linux and Microsoft Windows and shipped as a JDK and JRE in the Red Hat Ecosystem Catalog.
Providing feedback on Red Hat build of OpenJDK documentation
To report an error or to improve our documentation, log in to your Red Hat Jira account and submit an issue. If you do not have a Red Hat Jira account, then you will be prompted to create an account.
Procedure
- Click the following link to create a ticket.
- Enter a brief description of the issue in the Summary.
- Provide a detailed description of the issue or enhancement in the Description. Include a URL to where the issue occurs in the documentation.
- Clicking Create creates and routes the issue to the appropriate documentation team.
Making open source more inclusive
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.
Chapter 1. Red Hat build of OpenJDK 11 - Extended Lifecycle Support Phase 1
The 11.0.25 release in October 2024 was the last release of Red Hat build of OpenJDK 11 from Red Hat in the full support phase of the lifecycle. The full support phase for Red Hat build of OpenJDK 11 ended on 31 October 2024. See the Product Life Cycles page for details.
From November 2024 onward, Red Hat will provide extended lifecycle support phase 1 (ELS‑1) support for new releases of Red Hat build of OpenJDK 11 until 31 October 2027. Access to ELS requires an OpenJDK ELS subscription. OpenJDK ELS is not included in any other ELS subscription.
For more information about product lifecycle phases and available support levels, see Life Cycle Phases. For more information on how to enroll in the ELS-1 Support Phase and start using Red Hat build of OpenJDK 11 ELS, see Red Hat build of OpenJDK 11 Extended Lifecycle Support (ELS-1) Availability.
For information about migrating to Red Hat build of OpenJDK version 17 or 21, see Migrating to Red Hat build of OpenJDK 17 from earlier versions or Migrating to Red Hat build of OpenJDK 21 from earlier versions.
Chapter 2. Support policy for Red Hat build of OpenJDK
Red Hat will support select major versions of Red Hat build of OpenJDK in its products. For consistency, these are the same versions that Oracle designates as long-term support (LTS) for the Oracle JDK.
A major version of Red Hat build of OpenJDK will be supported for a minimum of six years from the time that version is first introduced. For more information, see the OpenJDK Life Cycle and Support Policy.
RHEL 6 reached the end of life in November 2020. Because of this, Red Hat build of OpenJDK is not supporting RHEL 6 as a supported configuration.
From November 2024 onward, Red Hat provides extended life cycle support phase 1 (ELS-1) support for new releases of Red Hat build of OpenJDK 11. For more information, see Red Hat build of OpenJDK 11 - Extended Life Cycle Support Phase 1.
Chapter 3. Differences from upstream OpenJDK 11
Red Hat build of OpenJDK in Red Hat Enterprise Linux (RHEL) contains a number of structural changes from the upstream distribution of OpenJDK. The Microsoft Windows version of Red Hat build of OpenJDK attempts to follow RHEL updates as closely as possible.
The following list details the most notable Red Hat build of OpenJDK 11 changes:
- FIPS support. Red Hat build of OpenJDK 11 automatically detects whether RHEL is in FIPS mode and automatically configures Red Hat build of OpenJDK 11 to operate in that mode. This change does not apply to Red Hat build of OpenJDK builds for Microsoft Windows.
- Cryptographic policy support. Red Hat build of OpenJDK 11 obtains the list of enabled cryptographic algorithms and key size constraints from RHEL. These configuration components are used by the Transport Layer Security (TLS) encryption protocol, the certificate path validation, and any signed JARs. You can set different security profiles to balance safety and compatibility. This change does not apply to Red Hat build of OpenJDK builds for Microsoft Windows.
-
Red Hat build of OpenJDK on RHEL dynamically links against native libraries such as
zlib
for archive format support andlibjpeg-turbo
,libpng
, andgiflib
for image support. RHEL also dynamically links againstHarfbuzz
andFreetype
for font rendering and management. -
The
src.zip
file includes the source for all the JAR libraries shipped with Red Hat build of OpenJDK. - Red Hat build of OpenJDK on RHEL uses system-wide timezone data files as a source for timezone information.
- Red Hat build of OpenJDK on RHEL uses system-wide CA certificates.
- Red Hat build of OpenJDK on Microsoft Windows includes the latest available timezone data from RHEL.
- Red Hat build of OpenJDK on Microsoft Windows uses the latest available CA certificate from RHEL.
Additional resources
- For more information about detecting if a system is in FIPS mode, see the Improve system FIPS detection example on the Red Hat RHEL Planning Jira.
- For more information about cryptographic policies, see Using system-wide cryptographic policies.
Chapter 4. Red Hat build of OpenJDK features
The latest Red Hat build of OpenJDK 11 release might include new features. Additionally, the latest release might enhance, deprecate, or remove features that originated from earlier Red Hat build of OpenJDK 11 releases.
For all the other changes and security fixes, see OpenJDK 11.0.27 Released.
Red Hat build of OpenJDK new features and enhancements
Review the following release notes to understand new features and feature enhancements that Red Hat build of OpenJDK 11.0.27 provides:
Warnings from jarsigner
tool about removed file entries
In earlier Red Hat build of OpenJDK releases, when a file was removed from a signed JAR file but the file signature was still present, the jarsigner
tool did not detect this situation.
In Red Hat build of OpenJDK 11.0.27, you can use the jarsigner ‑verify
command to check that every signature has a matching file entry. If any mismatch exists, this command prints a warning. To display the names of any mismatched entries, add the ‑verbose
option to the command.
See JDK-8309841 (JDK Bug System).
Distrust of TLS server certificates issued after 15 April 2025 and anchored by Camerfirma root CAs
In accordance with similar plans that Google, Mozilla, Apple, and Microsoft recently announced, Red Hat build of OpenJDK 11.0.27 distrusts TLS certificates that are issued after 15 April 2025 and anchored by Camerfirma root certificates.
Red Hat build of OpenJDK will continue to trust certificates that are issued on or before 15 April 2025 until these certificates expire.
If a server’s certificate chain is anchored by an affected certificate, any attempts to negotiate a TLS session now fail with an exception to indicate that the trust anchor is not trusted. For example:
TLS server certificate issued after 2025-04-15 and anchored by a distrusted legacy Camerfirma root CA: CN=Chambers of Commerce Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU
TLS server certificate issued after 2025-04-15 and anchored by a distrusted legacy Camerfirma root CA: CN=Chambers of Commerce Root -
2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU
You can check whether this change affects a certificate in a JDK keystore by using the following keytool
command:
keytool -v -list -alias <your_server_alias> -keystore <your_keystore_filename>
If this change affects any certificate in the chain, update this certificate or contact the organisation that is responsible for managing the certificate.
If you want to continue using TLS server certificates that are anchored by Camerfirma root certificates, you can remove CAMERFIRMA_TLS
from the jdk.security.caDistrustPolicies
security property either by modifying the java.security
configuration file or by using the java.security.properties
system property.
Continued use of the distrusted TLS server certificates is at your own risk.
These restrictions apply to the following Camerfirma root certificates that Red Hat build of OpenJDK includes:
- Certificate 1
- Alias name: camerfirmachamberscommerceca [jdk]
- Distinguished name: CN=Chambers of Commerce Root OU=http://www.chambersign.org O=AC Camerfirma SA CIF A82743287 C=EU
- SHA256: 0C:25:8A:12:A5:67:4A:EF:25:F2:8B:A7:DC:FA:EC:EE:A3:48:E5:41:E6:F5:CC:4E:E6:3B:71:B3:61:60:6A:C3
- Certificate 2
- Alias name: camerfirmachambersca [jdk]
- Distinguished name: CN=Chambers of Commerce Root - 2008 O=AC Camerfirma S.A. SERIALNUMBER=A82743287 L=Madrid (see current address at www.camerfirma.com/address) C=EU
- SHA256: 06:3E:4A:FA:C4:91:DF:D3:32:F3:08:9B:85:42:E9:46:17:D8:93:D7:FE:94:4E:10:A7:93:7E:E2:9D:96:93:C0
- Certificate 3
- Alias name: camerfirmachambersignca [jdk]
- Distinguished name: CN=Global Chambersign Root - 2008 O=AC Camerfirma S.A. SERIALNUMBER=A82743287 L=Madrid (see current address at www.camerfirma.com/address) C=EU
- SHA256: 13:63:35:43:93:34:A7:69:80:16:A0:D3:24:DE:72:28:4E:07:9D:7B:52:20:BB:8F:BD:74:78:16:EE:BE:BA:CA
See JDK-8346587 (JDK Bug System).
Fix for invokedynamic
string concatenation changing order of operations
The Indify String Concatenation feature that was added in OpenJDK 9 through JEP-280 introduced a regression in the order in which string concatenation expressions are evaluated. The Java Language Specification requires that operands are fully evaluated in left-to-right order. However, with the introduction of invokedynamic
(indy) call generation by the javac
compiler for evaluating string concatenation expressions, all operands were evaluated in order but not converted to strings. In this situation, each operand was converted to a string only later.
For example, consider the following code, where the third argument of the concatenation has the side effect of altering the value of builder
to "goodbye"
:
StringBuilder builder = new StringBuilder("good"); return "" + builder + builder.append("bye");
StringBuilder builder = new StringBuilder("good");
return "" + builder + builder.append("bye");
Based on the preceding example, in earlier releases, the Indify String Concatenation feature did not convert the second argument to a string until after the builder.append
method altered the StringBuilder
object. In this situation, the concatenation incorrectly became "" + "goodbye" + "goodbye"
, which produced "goodbyegoodbye"
as the output.
In Red Hat build of OpenJDK 11.0.27, string concatenation evaluates and eagerly converts each argument to a string in left-to-right order. In this situation, the concatenation correctly becomes "" + "good" + "goodbye"
, which produces "goodgoodbye"
as the output.
The resolution of this issue has the same effect as using a version of the javac
compiler that was available before OpenJDK 9 or running javac
with the -XDstringConcat=inline
command-line option.
Chapter 5. Advisories related to this release
The following advisories are issued to document bug fixes and CVE fixes included in this release:
Revised on 2025-04-29 11:39:09 UTC