IBM Support

PTF Groups and latest SR, FP

General Page

PTF groups and latest SR, FP
 
You are in: IBM i Technology Updates > Java on IBM i > PTF groups and latest SR, FP.
 

To help customers easily get the latest Java technology on IBM i, we group all the necessary PTFs into a PTF Group on every release of IBM i. 
The following table shows the Java PTF Groups for each release, as well as some of the important enhancements. Click on the links to learn more.

PTF Group Number

Release

Date

Level

Enhancements

SF99965

IBM i 7.6

 

 

 

 

 

04/2026

5

Java 8 SR8 FP60
Java 17 17.0.18+8
Java 21 21.0.10+7

 

 

12/2025

4

Java 8.0 SR8 FP55
Java 17 17.0.17+10
Java 21 21.0.9+10

 

 

10/2025

3

Java 8.0 SR8 FP50
Java 17 17.0.16+8
Java 21 21.0.8+9

 

 

08/2025

2

Java 8.0 SR8 FP45
Java 17 17.0.15+6
Java 21 21.0.7+6

 

 

04/2025

1

Java 21 GA

SF99955

IBM i 7.5

 

 

 

 

 

04/2026

20

Java 8 SR8 FP60
Java 11 11.0.30+7
Java 17 17.0.18+8
Java 21 21.0.10+7

 

 

12/2025

19

Java 8.0 SR8 FP55
Java 11 11.0.29+7
Java 17 17.0.17+10
Java 21 21.0.9+10

 

 

10/2025

18

Java 8.0 SR8 FP50
Java 11 11.0.28+6
Java 17 17.0.16+8

 

 

09/2025

17

Java 21 GA

 

 

07/2025

16

Java 11 11.0.27+6
(Resolves UnsatisfiedLinkError)

 

 

07/2025

15

Java 8.0 SR8 FP45
Java 11 11.0.27+6
Java 17 17.0.15+6

 

 

01/2025

14

Java 8.0 SR8 FP40
Java 11 11.0.26+4
Java 17 17.0.14+7

 

 

02/2025

13

Java 8.0 SR8 FP35
Java 11 11.0.25+9
Java 17 17.0.13+11

 

 

10/2024

12

Java 8.0 SR8 FP30
Java 11 11.0.24+8
Java 17 17.0.12+7

 

 

08/2024

11

Java 8.0 SR8 FP25
Java 11 11.0.23+9
Java 17 17.0.11+9

with Java 11 security changes

 

 

07/2024

10

Java 8.0 SR8 FP25
Java 11 11.0.23+9
Java 17 17.0.11+9

 

 

03/2024

9

Java 8.0 SR8 FP20
Java 11 11.0.22+7
Java 17 17.0.10+7

 

 

01/2024

8

Java 8.0 SR8 FP15
Java 11 11.0.21.0
Java 17 17.0.9+9

 

 

11/2023

7

Java 8.0 SR8 FP10
Java 11 11.0.20.1+1
Java 17 17.0.8.1+1

 

 

08/2023

6

Java 8.0 SR8 FP5
Java 11 SR19 FP7
Java 17 SR17 FP7

 

 

03/2023

5

Java 17 GA

 

 

01/2023

4

Java 8.0 SR7 FP20
Java 11 SR17
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20

 

 

10/2022

3

Java 8.0 SR7 FP15
Java 11 SR16 FP1

 

 

07/2022

2

Java 8.0 SR7 FP10
Java 11 SR15

 

 

04/2022

1

Java 8.0 SR7 FP5
Java 11 SR14 FP1

SF99665

IBM i 7.4

 

 

 

 

 

04/2026

32

Java 8 SR8 FP60
Java 11 11.0.30+7
Java 17 17.0.18+8

 

 

12/2025

31

Java 8.0 SR8 FP55
Java 11 11.0.29+7
Java 17 17.0.17+10

 

 

10/2025

30

Java 8.0 SR8 FP50
Java 11 11.0.28+6
Java 17 17.0.16+8

 

 

07/2025

29

Java 11 11.0.27+6

 

 

07/2025

28

Java 8.0 SR8 FP45
Java 11 11.0.27+6
Java 17 17.0.15+6

 

 

01/2025

27

Java 8.0 SR8 FP40
Java 11 11.0.26+4
Java 17 17.0.14+7

 

 

02/2025

26

Java 8.0 SR8 FP35
Java 11 11.0.25+9
Java 17 17.0.13+11

 

 

10/2024

25

Java 8.0 SR8 FP30
Java 11 11.0.24+8
Java 17 17.0.12+7

 

 

08/2024

24

Java 8.0 SR8 FP25
Java 11 11.0.23+9
Java 17 17.0.11+9
 
with Java 11 security changes 

 

 

07/2024

23

Java 8.0 SR8 FP25
Java 11 11.0.23+9
Java 17 17.0.11+9

 

 

03/2024

22

Java 8.0 SR8 FP20
Java 11 11.0.22+7
Java 17 17.0.10+7

 

 

01/2024

21

Java 8.0 SR8 FP15
Java 11 11.0.21.0
Java 17 17.0.9+9

 

 

11/2023

20

Java 8.0 SR8 FP10
Java 11 11.0.20.1+1
Java 17 17.0.8.1+1

 

 

08/2023

19

Java 8.0 SR8 FP5
Java 11 SR19 FP7
Java 17 SR17 FP7

 

 

03/2023

18

Java17 GA

 

 

01/2023

17

Java 8.0 SR7 FP20
Java 11 SR17
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20

 

 

10/2022

16

Java 8.0 SR7 FP15
Java 11 SR16 FP1

 

 

07/2022

15

Java 8.0 SR7 FP10
Java 11 SR15

 

 

03/2022

14

Java 8.0 SR7 FP5
Java 11 SR14 FP1

 

 

01/2022

13

Java 8.0 SR7
Java 11 SR13

 

 

10/2021

12

Java 8.0 SR6 FP35
Java 11 SR12

 

 

07/2021

11

Java 8.0 SR6 FP30
Java 11 SR11

Note:

TLS 1.0 and 1.1 are disabled by default

 

 

03/2021

10

Java 8.0 SR6 FP25

 

 

01/2021

9

Java 8.0 SR6 FP20

 

 

09/2020

8

Java 8.0 SR6 FP15

 

 

06/2020

7

Java 8.0 SR6 FP10

 

 

03/2020

6

Java 8.0 SR6 FP5

 

 

01/2020

5

Java 8.0 SR6

 

 

 

09/2019

4

Java 8.0 SR5 FP40

 

 

 

07/2019

3

Java 8.0 SR5 FP35

Note: Fix a hot issue

 

 

 

06/2019

2

Java 8.0 SR5 FP35

 

 

 

 

 

SF99725

IBM i 7.3

 

 

 

 

 

04/2026

41

Java 8 SR8 FP60
Java 11 11.0.30+7

 

 

12/2025

40

Java 8.0 SR8 FP55
Java 11 11.0.29+7

 

 

10/2025

39

Java 8.0 SR8 FP50
Java 11 11.0.28+6

 

 

07/2025

38

Java 8.0 SR8 FP45
Java 11 11.0.27+6

 

 

01/2025

37

Java 8.0 SR8 FP40
Java 11 11.0.26+4

 

 

02/2025

36

Java 8.0 SR8 FP35
Java 11 11.0.25+9

 

 

10/2024

35

Java 8.0 SR8 FP30
Java 11 11.0.24+8

 

 

08/2024

34

Java 8.0 SR8 FP25
Java 11 11.0.23+9
 
with Java 11 security chaanges

 

 

07/2024

33

Java 8.0 SR8 FP25
Java 11 11.0.23+9

 

 

03/2024

32

Java 8.0 SR8 FP20
Java 11 11.0.22+7

 

 

01/2024

31

Java 8.0 SR8 FP15
Java 11 11.0.21.0

 

 

11/2023

30

Java 8.0 SR8 FP10
Java 11 11.0.20.1+1

 

 

08/2023

29

 Java 8.0 SR8 FP5
 Java 11 SR19 FP7

 

 

01/2023

28

Java 8.0 SR7 FP20
Java 11 SR17
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20

 

 

10/2022

27

Java 7.0 SR11 FP15
Java 7.1 SR5 FP15
Java 8.0 SR7 FP15
Java 11 SR16 FP1

 

 

07/2022

26

Java 7.0 SR11 FP10
Java 7.1 SR5 FP10
Java 8.0 SR7 FP10
Java 11 SR15

 

 

03/2022

25

Java 7.0 SR11 FP5
Java 7.1 SR5 FP5
Java 8.0 SR7 FP5
Java 11 SR14 FP1

 

 

01/2022

24

Java 7.0 SR11
Java 7.1 SR5
Java 8.0 SR7
Java 11 SR13

 

 

10/2021

23

Java 7.0 SR10 FP90
Java 7.1 SR4 FP90
Java 8.0 SR6 FP35
Java 11 SR12

 

 

07/2021

22

Java 7.0 SR10 FP85
Java 7.1 SR4 FP85
Java 8.0 SR6 FP30
Java 11 SR11
Note:

TLS 1.0 and 1.1 are disabled by default

 

 

03/2021

21

Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25

 

 

01/2021

20

Java 7.0 SR10 FP75
Java 7.1 SR4 FP75
Java 8.0 SR6 FP20

 

 

09/2020

19

Java 7.0 SR10 FP70
Java 7.1 SR4 FP70
Java 8.0 SR6 FP15

 

 

06/2020

18

Java 7.0 SR10 FP65
Java 7.1 SR4 FP65
Java 8.0 SR6 FP10

 

 

03/2020

17

Java 7.0 SR10 FP60
Java 7.1 SR4 FP60
Java 8.0 SR6 FP5

 

 

01/2020

16

Java 7.0 SR10 FP55
Java 7.1 SR4 FP55
Java 8.0 SR6

 

 

 

09/2019

15

Java 7.0 SR10 FP50
Java 7.1 SR4 FP50
Java 8.0 SR5 FP40

 

 

 

07/2019

14

Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

Note: Fix a hot issue

 

 

 

06/2019

13

Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

 

 

 

03/2019

12

Java 7.0 SR10 FP40
Java 7.1 SR4 FP40
Java 8.0 SR5 FP30

 

 

 

12/2018

11

Java 7.0 SR10 FP35
Java 7.1 SR4 FP35
Java 8.0 SR5 FP25

 

 

 

09/2018

10

Java 7.0 SR10 FP30
Java 7.1 SR4 FP30
Java 8.0 SR5 FP20

 

 

 

06/2018

9

Java 7.0 SR10 FP25
Java 7.1 SR4 FP25
Java 8.0 SR5 FP15

 

 

04/2018

8

Java 7.0 SR10 FP20
Java 7.1 SR4 FP20
Java 8.0 SR5 FP10

 

 

12/2017

7

Java 7.0 SR10 FP15
Java 7.1 SR4 FP15
Java 8.0 SR5 FP5

 

 

 

09/2017

6

Java 7.0 SR10 FP10
Java 7.1 SR4 FP10
Java 8.0 SR4 FP10

 

 

 

06/2017

5

Java 7.0 SR10 FP5
Java 7.1 SR4 FP5
Java 8.0 SR4 FP5

 

 

 

04/2017

4

Java 7.0 SR10 FP1
Java 7.1 SR4 FP1
Java 8.0 SR4 FP1

 

 

 

09/2016

3

Java 7.0 SR9 FP50
Java 7.1 SR3 FP50
Java 8.0 SR3 FP10

 

 

06/2016

2

Java 7.0 SR9 FP40
Java 7.1 SR3 FP40
Java 8.0 SR3

 

 

04/2016

1

Java 7.0 SR9 FP30
Java 7.1 SR3 FP30
Java 8.0 SR2 FP10

SF99716

IBM i 7.2

 

 

 

 

 

01/2023

38

Java 8.0 SR7 FP20
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20

 

 

10/2022

37

Java 7.0 SR11 FP15
Java 7.1 SR5 FP15
Java 8.0 SR7 FP15

 

 

07/2022

36

Java 7.0 SR11 FP10
Java 7.1 SR5 FP10
Java 8.0 SR7 FP10

 

 

03/2022

35

Java 7.0 SR11 FP5
Java 7.1 SR5 FP5
Java 8.0 SR7 FP5

 

 

01/2022

34

Java 7.0 SR11
Java 7.1 SR5
Java 8.0 SR7

 

 

10/2021

33

Java 7.0 SR10 FP90
Java 7.1 SR4 FP90
Java 8.0 SR6 FP35

 

 

07/2021

32

Java 7.0 SR10 FP85
Java 7.1 SR4 FP85
Java 8.0 SR6 FP30

Note:

TLS 1.0 and 1.1 are disabled by default

 

 

03/2021

31

Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25

 

 

01/2021

30

Java 7.0 SR10 FP75
Java 7.1 SR4 FP75
Java 8.0 SR6 FP20

 

 

09/2020

27

Java 7.0 SR10 FP70
Java 7.1 SR4 FP70
Java 8.0 SR6 FP15

 

 

06/2020

26

Java 7.0 SR10 FP65
Java 7.1 SR4 FP65
Java 8.0 SR6 FP10

 

 

03/2020

25

Java 7.0 SR10 FP60
Java 7.1 SR4 FP60
Java 8.0 SR6 FP5

 

 

01/2020

24

Java 7.0 SR10 FP55
Java 7.1 SR4 FP55
Java 8.0 SR6

 

 

09/2019

23

Java 7.0 SR10 FP50
Java 7.1 SR4 FP50
Java 8.0 SR5 FP40

 

 

07/2019

22

Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

Note: Fix a hot issue

 

 

06/2019

21

Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

 

 

03/2019

20

Java 7.0 SR10 FP40
Java 7.1 SR4 FP40
Java 8.0 SR5 FP30

 

 

12/2018

19

Java 7.0 SR10 FP35
Java 7.1 SR4 FP35
Java 8.0 SR5 FP25

 

 

09/2018

18

Java 7.0 SR10 FP30
Java 7.1 SR4 FP30
Java 8.0 SR5 FP20

 

 

06/2018

17

Java 7.0 SR10 FP25
Java 7.1 SR4 FP25
Java 8.0 SR5 FP15

 

 

04/2018

16

Java 7.0 SR10 FP20
Java 7.1 SR4 FP20
Java 8.0 SR5 FP10

 

 

12/2017

15

Java 6.0 SR16 FP55
Java 6 2.6 SR8 FP55
Java 7.0 SR10 FP15
Java 7.1 SR4 FP15
Java 8.0 SR5 FP5

 

 

9/2017

14

Java 6.0 SR16 FP50
Java 6 2.6 SR8 FP50
Java 7.0 SR10 FP10
Java 7.1 SR4 FP10
Java 8.0 SR4 FP10

 

 

6/2017

13

Java 6.0 SR16 FP45
Java 6 2.6 SR8 FP45
Java 7.0 SR10 FP5
Java 7.1 SR4 FP5
Java 8.0 SR4 FP5

 

 

4/2017

12

Java 6.0 SR16 FP41
Java 6 2.6 SR8 FP41
Java 7.0 SR10 FP1
Java 7.1 SR4 FP1
Java 8.0 SR4 FP1

 

 

9/2016

11

Java 6.0 SR16 FP30
Java 6 2.6 SR8 FP30
Java 7.0 SR9 FP50
Java 7.1 SR3 FP50
Java 8.0 SR3 FP10

 

 

06/2016

10

Java 6.0 SR16 FP25
Java 6 2.6 SR8 FP25
Java 7.0 SR9 FP40
Java 7.1 SR3 FP40
Java 8.0 SR3

 

 

03/2016

9

Java 6.0 SR16 FP20
Java 6 2.6 SR8 FP20
Java 7.0 SR9 FP30
Java 7.1 SR3 FP30
Java 8.0 SR2 FP10

 

 

12/2015

8

Java 6.0 SR16 FP15
Java 6 2.6 SR8 FP15
Java 7.0 SR9 FP20
Java 7.1 SR3 FP20
Java 8.0 SR2

 

 

08/2015

7

Java 6.0 SR16 FP7
Java 6 2.6 SR8 FP7
Java 7.0 SR9 FP10
Java 7.1 SR3 FP10
Java 8.0 SR1 FP10

 

 

05/2015

6

Java 6 2.6 SR8 FP4
Java 7.0 SR9
Java 7.1 SR3
Java 8.0 SR1

 

 

04/2015

5

Supporting Java 8.0 GA released on 7.2. More details see page: News of Java on IBM i

Some performance fixes are included.

 

 

12/2014

4

JDK 6.0 SR16 FP2
JDK 6 2.6 SR8 FP2
JDK 7.0 SR8
JDK 7.1 SR2

 

 

09/2014

3

JDK 6.0 SR16 FP1
JDK 6 2.6 SR8 FP1
JDK 7.0 SR7 FP1
JDK 7.1 SR1 FP1

 

 

07/2014

2

JDK 6.0 SR16
JDK 6 2.6 SR8
JDK 7.0 SR7
JDK 7.1 SR1

SF99572

IBM i 7.1

01/2022

48

Java 7.0 SR11
Java 7.1 SR5
Java 8.0 SR7

 

 

10/2021

47

Java 7.0 SR10 FP90
Java 7.1 SR4 FP90
Java 8.0 SR6 FP35

 

 

07/2021

46

Java 7.0 SR10 FP85
Java 7.1 SR4 FP85
Java 8.0 SR6 FP30

Note:

TLS 1.0 and 1.1 are disabled by default

 

 

05/2021

45

Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25

 

 

03/2021

44

Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25

 

 

01/2021

43

Java 7.0 SR10 FP75
Java 7.1 SR4 FP75
Java 8.0 SR6 FP20

 

 

09/2020

42

Java 7.0 SR10 FP70
Java 7.1 SR4 FP70
Java 8.0 SR6 FP15

 

 

06/2020

41

Java 7.0 SR10 FP65
Java 7.1 SR4 FP65
Java 8.0 SR6 FP10

 

 

03/2020

40

Java 7.0 SR10 FP60
Java 7.1 SR4 FP60
Java 8.0 SR6 FP5

 

 

01/2020

39

Java 7.0 SR10 FP55
Java 7.1 SR4 FP55
Java 8.0 SR6

 

 

09/2019

38

Java 7.0 SR10 FP50
Java 7.1 SR4 FP50
Java 8.0 SR5 FP40

 

 

07/2019

37

Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

Note: Fix a hot issue

 

 

06/2019

36

Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

 

 

03/2019

35

Java 7.0 SR10 FP40
Java 7.1 SR4 FP40
Java 8.0 SR5 FP30

 

 

12/2018

34

Java 7.0 SR10 FP35
Java 7.1 SR4 FP35
Java 8.0 SR5 FP25

 

 

09/2018

33

Java 7.0 SR10 FP30
Java 7.1 SR4 FP30
Java 8.0 SR5 FP20

 

 

06/2018

32

Java 7.0 SR10 FP25
Java 7.1 SR4 FP25
Java 8.0 SR5 FP15

 

 

04/2018

31

Java 7.0 SR10 FP20
Java 7.1 SR4 FP20
Java 8.0 SR5 FP10

 

 

12/2017

30

Java 6.0 SR16 FP55
Java 6 2.6 SR8 FP55
Java 7.0 SR10 FP15
Java 7.1 SR4 FP15
Java 8.0 SR5 FP5

 

 

09/2017

29

Java 6.0 SR16 FP50
Java 6 2.6 SR8 FP50
Java 7.0 SR10 FP10
Java 7.1 SR4 FP10
Java 8.0 SR4 FP10

 

 

06/2017

28

Java 6.0 SR16 FP45
Java 6 2.6 SR8 FP45
Java 7.0 SR10 FP5
Java 7.1 SR4 FP5
Java 8.0 SR4 FP5

 

 

04/2017

27

Java 6.0 SR16 FP41
Java 6 2.6 SR8 FP41
Java 7.0 SR10 FP1
Java 7.1 SR4 FP1
Java 8.0 SR4 FP1

 

 

09/2016

26

Java 6.0 SR16 FP30
Java 6 2.6 SR8 FP30
Java 7.0 SR9 FP50
Java 7.1 SR3 FP50
Java 8.0 SR3 FP10

 

 

06/2016

25

Java 6.0 SR16 FP25
Java 6 2.6 SR8 FP25
Java 7.0 SR9 FP40
Java 7.1 SR3 FP40
Java 8.0 SR3

 

 

03/2016

24

Java 6.0 SR16 FP20
Java 6 2.6 SR8 FP20
Java 7.0 SR9 FP30
Java 7.1 SR3 FP30
Java 8.0 SR2 FP10

 

 

12/2015

23

Java 6.0 SR16 FP15
Java 6 2.6 SR8 FP15
Java 7.0 SR9 FP20
Java 7.1 SR3 FP20
Java 8.0 SR2

 

 

08/2015

22

Java 6.0 SR16 FP7
Java 6 2.6 SR8 FP7
Java 7.0 SR9 FP10
Java 7.1 SR3 FP10
Java 8.0 SR1 FP10

 

 

05/2015

21

Java 5.0 SR16 FP10
Java 6.0 SR16 FP4
Java 6 2.6 SR8 FP4
Java 7.0 SR9
Java 7.1 SR3
Java 8.0 SR1

 

 

04/2015

20

Supporting Java 80 GA released on i 7.1. More details see page: News of Java on IBM i.

Some performance fixes are included

 

 

12/2014

19

JDK 6.0 SR16 FP2
JDK 6 2.6 SR8 FP2
JDK 7.0 SR8
JDK 7.1 SR2

 

 

09/2014

18

JDK 5.0 SR16 FP6
JDK 6.0 SR16 FP1
JDK 6 2.6 SR8 FP1
JDK 7.0 SR7 FP1
JDK 7.1 SR1 FP1

 

 

07/2014

17

JDK 5.0 SR16 FP6
JDK 6.0 SR16
JDK 6 2.6 SR8
JDK 7.0 SR7
JDK 7.1 SR1

 

 

03/2014

16

JDK 5.0 SR16 FP5
JDK 6.0 SR15 FP1
JDK 6 2.6 SR7 FP1
JDK 7.0 SR6 FP1

 

 

12/2013

15

JDK 5.0 SR16 FP4
JDK 6.0 SR15
JDK 6 2.6 SR7
JDK 7.0 SR6
JDK 7.1 GA

 

 

08/2013

14

JDK 5.0 SR16 FP3
JDK 6.0 SR14
JDK 6 2.6 SR6
JDK 7.0 SR5

 

 

05/2013

13

JDK 5.0 SR16
JDK 6.0 SR13
JDK 6 2.6 SR5
JDK 7.0 SR4

 

 

01/2013

12

JDK 5.0 SR15
JDK 6.0 SR12
JDK 6 2.6 SR4
JDK 7.0 SR3

 

 

01/2013

11

JDK 142 SR13 FP13
JDK 5.0 SR14
JDK 6.0 SR11
JDK 6 2.6 SR3
JDK 7.0 SR2

 

 

09/2012

10

Fix some special CCSID issues on JDK 6 2.6 and JDK 7.0

 

 

07/2012

9

JDK 142 SR13 FP12
JDK 5.0 SR13 FP1
JDK 6.0 SR10 FP1
JDK 6 2.6 SR2
JDK 7.0 SR1

 

 

03/2012

8

JDK 142 SR13 FP11
JDK 5.0 SR13
JDK 6.0 SR10
JDK 6 2.6 SR1

 

 

12/2011

7

The minimum required level for JDK 7.0 support

 

 

07/2011

6

JDK 6 2.6 enabled

 

 

02/2011

5

JDK 142 FP8 + CVE-2010-4476
JDK 5.0 SR12 + CVE-2010-4476
JDK 6.0 SR9 + CVE-2010-4476

 

Java on IBM i follows the industry standards for Java technology. IBM i provides the support for almost all the latest Service Releases(SR) and/or Fix Pack(FP) for all supported JDKs. The following table shows the latest SR/FP supported on IBM i, and their release date.

 

JDKLatest SR/FPDate ReleasedV5R4 PTFsi 6.1 & i 7.1 PTFsi 7.2 PTFsi 7.3 PTFsi 7.4 PTFsi 7.5 PTFsImportant Updates
IBM Technology for Java 17         
 SR17 FP708/2023N/AN/AN/AN/A ** 
 GA03/2023N/AN/AN/AN/A** 
IBM Technology for Java 11         
 SR19 FP708/2023N/AN/AN/A *** 
 SR1701/2023N/AN/AN/A*** 
 SR16 FP110/2022N/AN/AN/A*** 
 SR1507/2022N/AN/AN/A*** 
 SR14 FP103/2022N/AN/AN/A*** 
 SR1301/2022N/AN/AN/A**  
 SR1210/2021N/AN/AN/A**  
 SR1107/2021N/AN/AN/A**  
IBM Technology for Java 8.0         
 SR8 FP508/2023N/AN/AN/A*** 
 SR7FP2001/2023N/AN/A****The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20
 SR7FP1510/2022N/AN/A**** 
 SR7FP1007/2022N/AN/A**** 
 SR7 FP503/2022N/AN/A**** 
 SR701/2022N/A*     
 SR6 FP3510/2021N/A*     
 SR6 FP3007/2021N/A*    
 SR6 FP2505/2021N/A
SI76104
SI76115
    We do not support IBMJCEPLUS by default on i 7.1.
 SR6 FP2503/2021N/A*     
 SR6 FP2001/2021N/A*     
 SR6 FP1509/2020N/A*     
 SR6 FP1006/2020N/A*     
 SR6 FP503/2020N/A*     
 SR601/2020N/A*     
 SR5 FP4009/2019N/A*     
 SR5 FP3507/2019N/A*     Fix a hot issue: Update libjclse29.so to use IBM i version
 SR5 FP3506/2019N/A*     
 SR5 FP3003/2019N/A*     
 SR5 FP2512/2018N/A*     
 SR5 FP2009/2018N/A*     
 SR5 FP1506/2018N/A*     
 SR5 FP1004/2018N/A*     
 SR5 FP512/2017N/A*     
 SR511/2017N/A*     
 SR4 FP109/2017N/A*     
 SR4 FP56/2017N/A*     
 SR4 FP14/2017N/A*     
 SR3 FP2012/2016N/A

32bit :

SI62990  SI62976
64bit:

SI62991  SI62973

32bit:

SI62992  SI62974
64bit:

SI62993  SI62972

32bit:

SI62994  SI62981
64bit:

SI62995  SI62983

  

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will fail. Here’s the work around if you encounter it with WAS
This will also work for other applications with similar changes.
 SR3 FP1009/2016N/A*     
 SR306/2016N/A*     
 SR2 FP1003/2016N/A*    Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
 SR212/2015N/A*     
 SR1 FP1008/2015N/A*    0-day vulnerability(CVE-2015-2590) has been fixed.
 SR105/2015N/A*     
 GA04/2015N/A*     
IBM Technology for Java 7.1         
 SR5 FP1510/2022N/AN/A**   
 SR5 FP1007/2022N/AN/A**   
 SR5 FP503/2022N/AN/A**   
 SR501/2022N/A*     
 SR4 FP9010/2021N/A*     
 SR4 FP8507/2021N/A*    
 SR4 FP8003/2021N/A*     
 SR4 FP7501/2021N/A*     
 SR4 FP7009/2020N/A*     
 SR4 FP6506/2020N/A*     
 SR4 FP6003/2020N/A*     
 SR4 FP5501/2020N/A*     
 SR4 FP5009/2019N/A*     
 SR4 FP4506/2019N/A*     
 SR4 FP4003/2019N/A*     
 SR4 FP3512/2018N/A*     
 SR4 FP3009/2018N/A*     
 SR4 FP2506/2018N/A*     
 SR4 FP2004/2018N/A*     
 SR4 FP1512/2017N/A*     
 SR4 FP109/2017N/A*     
 SR4 FP56/2017N/A*     
 SR4 FP14/2017N/A*     
 SR3 FP6012/2016N/A

32bit :

SI63035  SI63028
64bit:

SI63036  SI63031

32bit:

SI63131  SI63029
64bit:

SI63132  SI63032

32bit:

SI63039  SI63030
64bit:

SI63040  SI63033

  

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here’s the work around if you encounter it with WAS
This will also work for other applications with similar changes. 
 SR3 FP5009/2016N/A*     
 SR3 FP4006/2016N/A*     
 SR3 FP3003/2016N/A*    Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
 SR3 FP2012/2015N/A*     
 SR3 FP1008/2015N/A*    0-day vulnerability(CVE-2015-2590) has been fixed.
 SR305/2015N/A*     
 SR212/2014N/A*    

POODLE vulnerability has been fixed. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

 SR1FP109/2014N/A*     
 SR107/2014N/A*     
 GA12/2013N/A*     
IBM Technology for Java 7.0         
 
SR11
FP15
10/2022N/AN/A**   
 SR11 FP1007/2022N/AN/A**   
 SR11 FP503/2022N/AN/A**   
 SR1101/2022N/A*     
 SR10 FP9010/2021N/A*     
 SR10 FP8507/2021N/A*    
 SR10 FP8003/2021N/A*     
 SR10 FP7501/2021N/A*     
 SR10 FP7009/2020N/A*     
 SR10 FP6506/2020N/A*     
 SR10 FP6003/2020N/A*     
 SR10 FP5501/2020N/A*     
 SR10 FP5009/2019N/A*     
 SR10 FP4506/2019N/A*     
 SR10 FP4003/2019N/A*     
 SR10 FP3512/2018N/A*     
 SR10 FP3009/2018N/A*     
 SR10 FP2506/2018N/A*     
 SR10 FP2004/2018N/A*     
 SR10 FP1512/2017N/A*     
 SR10 FP109/2017N/A*     
 SR10 FP56/2017N/A*     
 SR10 FP14/2017N/A*     
 SR9 FP6012/2016N/A

32bit :

SI63010  SI63019  SI63021
64bit:  

32bit:

SI63131  SI63022
64bit:

SI63132  SI63026

32bit:

SI63014  SI63023
64bit:

SI63015  SI63027

  

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here’s the work around if you encounter it with WAS.
This will also work for other applications with similar changes. 
 SR9 FP5009/2016N/A*     
 SR9 FP4006/2016N/A*     
 SR9 FP3003/2016N/A*    Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
 SR9 FP2012/2015N/A*     
 SR9 FP1008/2015N/A*    0-day vulnerability(CVE-2015-2590) has been fixed.
 SR905/2015N/A*     
 SR812/2014N/A*    

POODLE vulnerability has been fixed. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

 SR7FP109/2014N/A*     
 SR707/2014N/A*     
 SR6 FP103/2014N/A*     
 SR612/2013N/A*     
 SR508/2013N/A*    

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537

http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/enhancements-7.html (Although this document is for Java 7, the fix is in all JDKs)

 SR405/2013N/A*     
 SR301/2013N/A*    http://www-01.ibm.com/support/docview.wss?uid=swg21617227

 

SR201/2013N/A*     
 SR109/2012N/A*     
IBM Technology for Java 6 2.6         
 SR8FP5512/2017N/A*     
 SR8FP509/2017N/A*     
 SR8FP456/2017N/A*   
 SR8FP414/2017N/A*   
 SR8FP3512/2016N/A

32bit:

SI63044  SI62978
64bit:

SI63045  SI62979

32bit:

SI63047  SI62982
64bit:

SI63046  SI62980

N/A  

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here’s the work around if you encounter it with WAS

This will also work for other applications with similar changes.  

 SR8FP3009/2016N/A*     
 SR8FP2506/2016N/A*     
 SR8FP2003/2016N/A     Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
 SR8FP1512/2015N/A      
 SR8FP708/2015N/A*    0-day vulnerability(CVE-2015-2590) has been fixed.
 SR8FP405/2015N/A*     
 SR8FP212/2014N/A*    

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

 SR8FP109/2014N/A*     
 SR807/2014N/A*     
 SR7 FP103/2014N/A*     
 SR712/2013N/A*     
 SR608/2013N/A*    

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537

http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/enhancements-7.html (Although this document is for Java 7, the fix is in all JDKs)

 SR504/2013N/A*     
 SR401/2013N/A*    http://www-01.ibm.com/support/docview.wss?uid=swg21617227

 

SR301/2013N/A*     
 SR209/2012N/A*     
IBM Technology for Java 6.0         
 SR16FP5512/2017N/A*     
 SR16FP509/2017N/A*     
 SR16FP456/2017N/A*     
 SR16FP414/2017N/A      
 SR16FP3512/2016N/A

32bit:  

SI63003  SI62968
64bit:  

SI63002  SI62969

32bit:  

SI63001  SI62970
64bit:  

SI63000  SI62971

N/A  

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here is the work around if you encounter it with WAS. This also work for other applications with similar changes.  

 SR16FP3009/2016N/A*     
 SR16FP2506/2016N/A*     
 SR16FP2003/2016N/A*    Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
 SR16FP1512/2015N/A*     
 SR16FP708/2015N/A*    0-day vulnerability(CVE-2015-2590) has been fixed.
 SR16FP405/2015N/A*     
 SR16FP212/2014N/A*    

POODLE vulnerability has been fixed. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

 SR16FP109/2014N/A*     
 SR1607/2014N/A*     
 SR15 FP103/2014N/A*     
 SR1512/2013N/A*     
 SR1408/2013**    

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537

http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/enhancements-7.html (Although this document is for Java 7, the fix is in all JDKs)

 

SR1304/2013**     
 SR1201/2013**    http://www-01.ibm.com/support/docview.wss?uid=swg21617227
 SR1101/2013**     
 SR1009/2012**     
          

NOTE:

*: These SRs are already in the PTF group, and the dates released are also aligned with the PTF group release dates. Please refer the PTF group table above for the specific PTF group level.  We suggest you upgrade to the latest PTF groups to avoid any known issues.

 

 

[{"Business Unit":{"code":"BU070","label":"IBM Infrastructure"},"Product":{"code":"SWG60","label":"IBM i"},"Component":"","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"All Versions","Edition":"","Line of Business":{"code":"LOB68","label":"Power HW"}}]

Document Information

Modified date:
12 April 2026

UID

ibm11117857