이 콘텐츠는 선택한 언어로 제공되지 않습니다.

Release notes for Red Hat build of OpenJDK 17.0.17


Red Hat build of OpenJDK 17

Red Hat Customer Content Services

Abstract

The Release notes for Red Hat build of OpenJDK 17.0.17 document provides an overview of new features in Red Hat build of OpenJDK 17 and a list of potential known issues and possible workarounds.

Preface

Open Java Development Kit (OpenJDK) is a free and open source implementation of the Java Platform, Standard Edition (Java SE). The Red Hat build of OpenJDK is available in four versions: 8u, 11u, 17u, and 21u.

Packages for the Red Hat build of OpenJDK are made available on Red Hat Enterprise Linux and Microsoft Windows and shipped as a JDK and JRE in the Red Hat Ecosystem Catalog.

Providing feedback on Red Hat build of OpenJDK documentation

To report an error or to improve our documentation, log in to your Red Hat Jira account and submit an issue. If you do not have a Red Hat Jira account, then you will be prompted to create an account.

Procedure

  1. Click the following link to create a ticket.
  2. Enter a brief description of the issue in the Summary.
  3. Provide a detailed description of the issue or enhancement in the Description. Include a URL to where the issue occurs in the documentation.
  4. Clicking Create creates and routes the issue to the appropriate documentation team.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.

Chapter 1. Support policy for Red Hat build of OpenJDK

Red Hat will support select major versions of Red Hat build of OpenJDK in its products. For consistency, these versions remain similar to Oracle JDK versions that are designated as long-term support (LTS).

A major version of Red Hat build of OpenJDK will be supported for a minimum of six years from the time that version is first introduced. For more information, see the OpenJDK Life Cycle and Support Policy.

Note

RHEL 6 reached the end of life in November 2020. Because of this, Red Hat build of OpenJDK is not supporting RHEL 6 as a supported configuration.

Chapter 2. Differences from upstream OpenJDK 17

Red Hat build of OpenJDK in Red Hat Enterprise Linux contains a number of structural changes from the upstream distribution of OpenJDK. The Microsoft Windows version of Red Hat build of OpenJDK attempts to follow Red Hat Enterprise Linux updates as closely as possible.

The following list details the most notable Red Hat build of OpenJDK 17 changes:

  • FIPS support. Red Hat build of OpenJDK 17 automatically detects whether RHEL is in FIPS mode and automatically configures Red Hat build of OpenJDK 17 to operate in that mode. This change does not apply to Red Hat build of OpenJDK builds for Microsoft Windows.
  • Cryptographic policy support. Red Hat build of OpenJDK 17 obtains the list of enabled cryptographic algorithms and key size constraints from the RHEL system configuration. These configuration components are used by the Transport Layer Security (TLS) encryption protocol, the certificate path validation, and any signed JARs. You can set different security profiles to balance safety and compatibility. This change does not apply to Red Hat build of OpenJDK builds for Microsoft Windows.
  • The src.zip file includes the source for all of the JAR libraries shipped with Red Hat build of OpenJDK.
  • Red Hat build of OpenJDK on RHEL uses system-wide timezone data files as a source for timezone information.
  • Red Hat build of OpenJDK on RHEL uses system-wide CA certificates.
  • Red Hat build of OpenJDK on Microsoft Windows includes the latest available timezone data from RHEL.
  • Red Hat build of OpenJDK on Microsoft Windows uses the latest available CA certificate from RHEL.

Chapter 3. Red Hat build of OpenJDK features

The latest Red Hat build of OpenJDK 17 release might include new features. Additionally, the latest release might enhance, deprecate, or remove features that originated from earlier Red Hat build of OpenJDK 17 releases.

Note

For all the other changes and security fixes, see OpenJDK 17.0.17 Released.

3.1. Red Hat build of OpenJDK enhancements

Red Hat build of OpenJDK 17 provides enhancements to features originally created in earlier releases of Red Hat build of OpenJDK.

Improved HTTP/2 flow control checks

Red Hat build of OpenJDK 17.0.17 enhances the HTTP/2 client implementation in java.net.http.HttpClient objects to report flow control errors to the server. This behavior is typically transparent in most situations. However, it might mean that streams are reset or connections are closed when connecting to an HTTP/2 server that does not correctly handle these errors.

You can use the following existing properties to adjust flow control limits:

jdk.httpclient.connectionWindowSize
  • Specifies the HTTP/2 client connection window size in bytes
  • Default value: 67108864 (2^26, 64 MiB)
  • Range: 2^16-1 to 2^31-1
jdk.httpclient.windowSize
  • Specifies the HTTP/2 client stream window size in bytes
  • Default value: 16777216 (2^24, 16 MiB)
  • Range: 2^14 to 2^31-1

If you specify an invalid value, the default value is used. This enhancement guarantees that the actual value for the connection window size is not smaller than the stream window size.

See JDK-8342075 (JDK Bug System).

XML Security for Java updated to Apache Santuario 3.0.5

From Red Hat build of OpenJDK 17.0.17 onward, the XML signature implementation is based on Apache Santuario 3.0.5. This supersedes the behavior in earlier releases where the XML signature implementation was based on Apache Santuario 3.0.3.

This enhancement introduces the following four SHA-3-based ECDSA SignatureMethod algorithms:

  • ECDSA_SHA3_224
  • ECDSA_SHA3_256
  • ECDSA_SHA3_384
  • ECDSA_SHA3_512

Because the SignatureMethod constants for these algorithms are available in Java 25 only, use the following equivalent string literal values to obtain instances of these algorithms:

  • http://www.w3.org/2021/04/xmldsig-more#ecdsa-sha3-224
  • http://www.w3.org/2021/04/xmldsig-more#ecdsa-sha3-256
  • http://www.w3.org/2021/04/xmldsig-more#ecdsa-sha3-384
  • http://www.w3.org/2021/04/xmldsig-more#ecdsa-sha3-512

See JDK-8344137 (JDK Bug System).

LDAP and RMI protocol-specific object factory filters for JNDI

The OpenJDK security updates in April 2021 introduced jdk.jndi.object.factoriesFilter as both a system property and a security property. This property is used to control whether a specific object factory is permitted to instantiate objects from the remote object references that are obtained by using the protocols in the Java Naming and Directory Interface (JNDI) API. By default, this property was set to an asterisk (*) wildcard value to allow all object factory classes.

Red Hat build of OpenJDK 17.0.17 introduces the following two additional properties to provide more granular control of the Lightweight Directory Access Protocol (LDAP) and Remote Method Invocation (RMI) protocols that JNDI uses:

  • jdk.jndi.ldap.object.factoriesFilter

    This property filters object factory classes that are used with object references obtained from a JNDI/LDAP context. The default value is java.naming/com.sun.jndi.ldap.**;!* to allow only object factories that are defined in the java.naming module.

  • jdk.jndi.rmi.object.factoriesFilter

    This property filters object factory classes that are used with object references obtained from a JNDI/RMI context. The default value is jdk.naming.rmi/com.sun.jndi.rmi.**;!* to allow only object factories that are defined in the jdk.naming.rmi module.

Each of these new properties is also available as both a system property and a security property. When using the default values, the system property takes precedence over the security property.

Each filter can return a result of ALLOWED, REJECTED, or UNDECIDED by using the Status enumeration from the java.io.ObjectInputFilter interface.

For an object factory class to be accepted, it must meet both of the following conditions:

  • Either the global filter, jdk.jndi.object.factoriesFilter, or the filter for the specific protocol must return ALLOWED.
  • Neither the global filter, jdk.jndi.object.factoriesFilter, nor the filter for the specific protocol must return REJECTED.

If an application depends on custom object factories to instantiate objects from remote RMI or LDAP object references, ensure that you update the appropriate filter property to allow these factories to function. Otherwise, the filter will block the factory and a plain javax.naming.Reference instance is returned instead.

See JDK-8290368 (JDK Bug System).

Mechanism for disabling different parts of the TLS cipher suite based on pattern matching

In earlier releases, the mechanisms for disabling TLS algorithms were either too general or too specific. For example, if you disabled an algorithm such as RSA, the JDK disabled all cipher suites that used this algorithm. In this situation, the only alternative was to disable each cipher suite specifically.

From Red Hat build of OpenJDK 17.0.17 onward, the jdk.tls.disabledAlgorithms security property in the java.security configuration file supports asterisk (*) wildcard characters for patterns that start with "TLS_". For example, TLS_RSA_* disables all cipher suites that start with TLS_RSA_.

See JDK-8341964 (JDK Bug System).

Mechanism for disabling signature schemes based on their TLS scope

From Red Hat build of OpenJDK 17.0.17 onward, the jdk.tls.disabledAlgorithms security property also accepts suffix values that specify and limit the use of specific algorithms. In this situation, you can specify that a particular algorithm may be used in TLS handshake exchanges only or for signing TLS certificates only.

Each suffix value must consist of the word usage and either HandshakeSignature for TLS handshake exchanges or CertificateSignature for TLS certificates. For example, rsa_pkcs1_sha1 usage HandshakeSignature indicates that the rsa_pkcs1_sha1 algorithm may be used in TLS handshake exchanges only and it cannot be used for signing TLS certificates.

Note

If you do not specify a suffix for a particular algorithm, this algorithm is considered to be fully disabled as in earlier releases.

See JDK-8349583 (JDK Bug System).

"Best-fit" mapping disabled in Windows command prompt

In earlier releases, on Windows platforms, the Java launcher used the American National Standards Institute (ANSI) version of the GetCommandLine() Win32 API call to obtain command-line arguments. In this situation, if the command-line arguments contained Unicode characters that did not exist in the ANSI code page, these arguments were converted to other characters based on the Windows "best fit" mapping. However, this mapping could have introduced unexpected characters and differed between code pages.

From Red Hat build of OpenJDK 17.0.17 onward, the JDK reads command-line arguments as Unicode characters and then converts them to the ANSI code page, using the default replacement for any unmappable character. If applications need to use unmappable characters as is, without replacement, ensure that you select UTF-8 in the Windows regional settings.

See JDK-8337506 (JDK Bug System).

Information improvements for container memory usage

From Red Hat build of OpenJDK 17.0.17 onward, the JDK provides additional information for containers by also including memory usage details for both the Resident Set Size (RSS) and the cache. These memory usage details are specified in bytes.

This additional information is visible in both of the following locations:

  • The output of the jcmd <PID> VM.info command (where <PID> represents the running JVM)
  • The hs_err file that is generated if the JVM terminates abruptly

See JDK-8313083 (JDK Bug System).

Fix for SunMSCAPI provider to allow processes without elevated permissions to read local computer keystore certificates

In earlier releases, the SunMSCAPI provider required processes to have administrator privileges to access the local computer keystore.

From Red Hat build of OpenJDK 17.0.17 onward, the SunMSCAPI provider allows processes without elevated permissions to access the keystore in read-only mode by using the CERT_STORE_MAXIMUM_ALLOWED_FLAG.

See JDK-8313367 (JDK Bug System).

3.2. Red Hat build of OpenJDK deprecated features

The following pre-existing features have been either deprecated or removed in Red Hat build of OpenJDK 17.0.17:

AffirmTrust root CA certificates removed

From Red Hat build of OpenJDK 17.0.17 onward, the cacerts truststore no longer includes the following AffirmTrust root certificates, which were deactivated in the Red Hat build of OpenJDK 17.0.13 release in October 2024:

Certificate 1
  • Alias name: affirmtrustcommercialca [jdk]
  • Distinguished name: CN=AffirmTrust Commercial, O=AffirmTrust, C=US
  • SHA256: 03:76:AB:1D:54:C5:F9:80:3C:E4:B2:E2:01:A0:EE:7E:EF:7B:57:B6:36:E8:A9:3C:9B:8D:48:60:C9:6F:5F:A7
Certificate 2
  • Alias name: affirmtrustnetworkingca [jdk]
  • Distinguished name: CN=AffirmTrust Networking, O=AffirmTrust, C=US
  • SHA256: 0A:81:EC:5A:92:97:77:F1:45:90:4A:F3:8D:5D:50:9F:66:B5:E2:C5:8F:CD:B5:31:05:8B:0E:17:F3:F0B4:1B
Certificate 3
  • Alias name: affirmtrustpremiumca [jdk]
  • Distinguished name: CN=AffirmTrust Premium, O=AffirmTrust, C=US
  • SHA256: 70:A7:3F:7F:37:6B:60:07:42:48:90:45:34:B1:14:82:D5:BF:0E:69:8E:CC:49:8D:F5:25:77:EB:F2:E9:3B:9A
Certificate 4
  • Alias name: affirmtrustpremiumeccca [jdk]
  • Distinguished name: CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US
  • SHA256: BD:71:FD:F6:DA:97:E4:CF:62:D1:64:7A:DD:25:81:B0:7D:79:AD:F8:39:7E:B4:EC:BA:9C:5E:84:88:82:14:23

See JDK-8361212 (JDK Bug System).

Chapter 4. Advisories related to this release

The following advisories are issued to document bug fixes and CVE fixes included in this release:

Revised on 2025-10-24 09:03:02 UTC

Legal Notice

Copyright © 2025 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.
맨 위로 이동
Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2025 Red Hat