IBM Support

PTF Groups and latest SR, FP

General Page

PTF groups and latest SR, FP
 
You are in: IBM i Technology Updates > Java on IBM i > PTF groups and latest SR, FP.
 

To help customers easily get the latest Java technology on IBM i, we group all the necessary PTFs into a PTF Group on every release of IBM i. 
The following table shows the Java PTF Groups for each release, as well as some of the important enhancements. Click on the links to learn more.

PTF Group NumberReleaseDateLevelEnhancements
SF99965
IBM i 7.6
   
  12/20254
Java 8.0 SR8 FP55
Java 17 17.0.17+10
Java 21 21.0.9+10
  10/20253
Java 8.0 SR8 FP50
Java 17 17.0.16+8
Java 21 21.0.8+9
  08/20252
Java 8.0 SR8 FP45
Java 17 17.0.15+6
Java 21 21.0.7+6
  04/20251
Java 21 GA
SF99955
IBM i 7.5
   
  12/202519
Java 8.0 SR8 FP55
Java 11 11.0.29+7
Java 17 17.0.17+10
Java 21 21.0.9+10
  10/202518
Java 8.0 SR8 FP50
Java 11 11.0.28+6
Java 17 17.0.16+8
  09/202517Java 21 GA
  07/202516
Java 11 11.0.27+6
(Resolves UnsatisfiedLinkError)
  07/202515
Java 8.0 SR8 FP45
Java 11 11.0.27+6
Java 17 17.0.15+6
  01/202514
Java 8.0 SR8 FP40
Java 11 11.0.26+4
Java 17 17.0.14+7
  02/202513
Java 8.0 SR8 FP35
Java 11 11.0.25+9
Java 17 17.0.13+11
  10/202412
Java 8.0 SR8 FP30
Java 11 11.0.24+8
Java 17 17.0.12+7
  08/202411
Java 8.0 SR8 FP25
Java 11 11.0.23+9
Java 17 17.0.11+9

with Java 11 security changes
  07/202410
Java 8.0 SR8 FP25
Java 11 11.0.23+9
Java 17 17.0.11+9
  03/20249
Java 8.0 SR8 FP20
Java 11 11.0.22+7
Java 17 17.0.10+7
  01/20248
Java 8.0 SR8 FP15
Java 11 11.0.21.0
Java 17 17.0.9+9
  11/20237
Java 8.0 SR8 FP10
Java 11 11.0.20.1+1
Java 17 17.0.8.1+1
  08/20236
Java 8.0 SR8 FP5
Java 11 SR19 FP7
Java 17 SR17 FP7
  03/20235Java 17 GA
  01/20234
Java 8.0 SR7 FP20
Java 11 SR17
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20
  10/20223
Java 8.0 SR7 FP15
Java 11 SR16 FP1
  07/20222
Java 8.0 SR7 FP10
Java 11 SR15
  04/20221
Java 8.0 SR7 FP5
Java 11 SR14 FP1
SF99665IBM i 7.4   
  12/202531
Java 8.0 SR8 FP55
Java 11 11.0.29+7
Java 17 17.0.17+10
  10/202530
Java 8.0 SR8 FP50
Java 11 11.0.28+6
Java 17 17.0.16+8
  07/202529
Java 11 11.0.27+6
  07/202528
Java 8.0 SR8 FP45
Java 11 11.0.27+6
Java 17 17.0.15+6
  01/202527
Java 8.0 SR8 FP40
Java 11 11.0.26+4
Java 17 17.0.14+7
  02/202526
Java 8.0 SR8 FP35
Java 11 11.0.25+9
Java 17 17.0.13+11
  10/202425
Java 8.0 SR8 FP30
Java 11 11.0.24+8
Java 17 17.0.12+7
  08/202424
Java 8.0 SR8 FP25
Java 11 11.0.23+9
Java 17 17.0.11+9
 
with Java 11 security changes 
  07/202423
Java 8.0 SR8 FP25
Java 11 11.0.23+9
Java 17 17.0.11+9
  03/202422
Java 8.0 SR8 FP20
Java 11 11.0.22+7
Java 17 17.0.10+7
  01/202421
Java 8.0 SR8 FP15
Java 11 11.0.21.0
Java 17 17.0.9+9
  11/202320
Java 8.0 SR8 FP10
Java 11 11.0.20.1+1
Java 17 17.0.8.1+1
  08/202319
Java 8.0 SR8 FP5
Java 11 SR19 FP7
Java 17 SR17 FP7
  03/202318Java17 GA
  01/202317
Java 8.0 SR7 FP20
Java 11 SR17
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20
  10/202216
Java 8.0 SR7 FP15
Java 11 SR16 FP1
  07/202215
Java 8.0 SR7 FP10
Java 11 SR15
  03/202214
Java 8.0 SR7 FP5
Java 11 SR14 FP1
  01/202213
Java 8.0 SR7
Java 11 SR13
  10/202112
Java 8.0 SR6 FP35
Java 11 SR12
  07/202111
Java 8.0 SR6 FP30
Java 11 SR11

Note:

TLS 1.0 and 1.1 are disabled by default

  03/202110Java 8.0 SR6 FP25
  01/20219Java 8.0 SR6 FP20
  09/20208Java 8.0 SR6 FP15
  06/20207Java 8.0 SR6 FP10
  03/20206Java 8.0 SR6 FP5
  01/20205Java 8.0 SR6

 

 

 09/20194Java 8.0 SR5 FP40

 

 

 07/20193

Java 8.0 SR5 FP35

Note: Fix a hot issue

 

 

 06/20192Java 8.0 SR5 FP35
     
SF99725IBM i 7.3   
  12/2025

40

Java 8.0 SR8 FP55
Java 11 11.0.29+7
  10/202539
Java 8.0 SR8 FP50
Java 11 11.0.28+6
  07/202538
Java 8.0 SR8 FP45
Java 11 11.0.27+6
  01/202537
Java 8.0 SR8 FP40
Java 11 11.0.26+4
  02/202536
Java 8.0 SR8 FP35
Java 11 11.0.25+9
  10/202435
Java 8.0 SR8 FP30
Java 11 11.0.24+8
  08/202434
Java 8.0 SR8 FP25
Java 11 11.0.23+9
 
with Java 11 security chaanges
  07/202433
Java 8.0 SR8 FP25
Java 11 11.0.23+9
  03/202432
Java 8.0 SR8 FP20
Java 11 11.0.22+7
  01/202431
Java 8.0 SR8 FP15
Java 11 11.0.21.0
  11/202330
Java 8.0 SR8 FP10
Java 11 11.0.20.1+1
  08/202329
 Java 8.0 SR8 FP5
 Java 11 SR19 FP7
  01/202328
Java 8.0 SR7 FP20
Java 11 SR17
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20
  10/202227
Java 7.0 SR11 FP15
Java 7.1 SR5 FP15
Java 8.0 SR7 FP15
Java 11 SR16 FP1
  07/202226
Java 7.0 SR11 FP10
Java 7.1 SR5 FP10
Java 8.0 SR7 FP10
Java 11 SR15
  03/202225
Java 7.0 SR11 FP5
Java 7.1 SR5 FP5
Java 8.0 SR7 FP5
Java 11 SR14 FP1
  01/202224
Java 7.0 SR11
Java 7.1 SR5
Java 8.0 SR7
Java 11 SR13
  10/202123
Java 7.0 SR10 FP90
Java 7.1 SR4 FP90
Java 8.0 SR6 FP35
Java 11 SR12
  07/202122
Java 7.0 SR10 FP85
Java 7.1 SR4 FP85
Java 8.0 SR6 FP30
Java 11 SR11
Note:

TLS 1.0 and 1.1 are disabled by default

  03/202121Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25
  01/202120Java 7.0 SR10 FP75
Java 7.1 SR4 FP75
Java 8.0 SR6 FP20
  09/202019Java 7.0 SR10 FP70
Java 7.1 SR4 FP70
Java 8.0 SR6 FP15
  06/202018Java 7.0 SR10 FP65
Java 7.1 SR4 FP65
Java 8.0 SR6 FP10
  03/202017Java 7.0 SR10 FP60
Java 7.1 SR4 FP60
Java 8.0 SR6 FP5
  01/202016Java 7.0 SR10 FP55
Java 7.1 SR4 FP55
Java 8.0 SR6

 

 

 09/201915

Java 7.0 SR10 FP50
Java 7.1 SR4 FP50
Java 8.0 SR5 FP40

 

 

 07/201914

Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

Note: Fix a hot issue

 

 

 06/201913Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

 

 

 03/201912Java 7.0 SR10 FP40
Java 7.1 SR4 FP40
Java 8.0 SR5 FP30

 

 

 12/201811Java 7.0 SR10 FP35
Java 7.1 SR4 FP35
Java 8.0 SR5 FP25

 

 

 09/201810Java 7.0 SR10 FP30
Java 7.1 SR4 FP30
Java 8.0 SR5 FP20

 

 

 06/20189Java 7.0 SR10 FP25
Java 7.1 SR4 FP25
Java 8.0 SR5 FP15
  04/20188Java 7.0 SR10 FP20
Java 7.1 SR4 FP20
Java 8.0 SR5 FP10
  12/20177Java 7.0 SR10 FP15
Java 7.1 SR4 FP15
Java 8.0 SR5 FP5

 

 

 09/20176Java 7.0 SR10 FP10
Java 7.1 SR4 FP10
Java 8.0 SR4 FP10

 

 

 06/20175Java 7.0 SR10 FP5
Java 7.1 SR4 FP5
Java 8.0 SR4 FP5

 

 

 04/20174Java 7.0 SR10 FP1
Java 7.1 SR4 FP1
Java 8.0 SR4 FP1

 

 

 09/20163Java 7.0 SR9 FP50
Java 7.1 SR3 FP50
Java 8.0 SR3 FP10
  06/20162Java 7.0 SR9 FP40
Java 7.1 SR3 FP40
Java 8.0 SR3
  04/20161Java 7.0 SR9 FP30
Java 7.1 SR3 FP30
Java 8.0 SR2 FP10
SF99716IBM i 7.2   
  01/202338
Java 8.0 SR7 FP20
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20
  10/202237
Java 7.0 SR11 FP15
Java 7.1 SR5 FP15
Java 8.0 SR7 FP15
  07/202236
Java 7.0 SR11 FP10
Java 7.1 SR5 FP10
Java 8.0 SR7 FP10
  03/202235
Java 7.0 SR11 FP5
Java 7.1 SR5 FP5
Java 8.0 SR7 FP5
  01/202234
Java 7.0 SR11
Java 7.1 SR5
Java 8.0 SR7
  10/202133Java 7.0 SR10 FP90
Java 7.1 SR4 FP90
Java 8.0 SR6 FP35
  07/202132
Java 7.0 SR10 FP85
Java 7.1 SR4 FP85
Java 8.0 SR6 FP30

Note:

TLS 1.0 and 1.1 are disabled by default

  03/202131Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25
  01/202130Java 7.0 SR10 FP75
Java 7.1 SR4 FP75
Java 8.0 SR6 FP20
  09/202027Java 7.0 SR10 FP70
Java 7.1 SR4 FP70
Java 8.0 SR6 FP15
  06/202026Java 7.0 SR10 FP65
Java 7.1 SR4 FP65
Java 8.0 SR6 FP10
  03/202025Java 7.0 SR10 FP60
Java 7.1 SR4 FP60
Java 8.0 SR6 FP5
  01/202024Java 7.0 SR10 FP55
Java 7.1 SR4 FP55
Java 8.0 SR6
  09/201923Java 7.0 SR10 FP50
Java 7.1 SR4 FP50
Java 8.0 SR5 FP40
  07/201922

Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

Note: Fix a hot issue

  06/201921Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35
  03/201920Java 7.0 SR10 FP40
Java 7.1 SR4 FP40
Java 8.0 SR5 FP30
  12/201819Java 7.0 SR10 FP35
Java 7.1 SR4 FP35
Java 8.0 SR5 FP25
  09/201818Java 7.0 SR10 FP30
Java 7.1 SR4 FP30
Java 8.0 SR5 FP20
  06/201817Java 7.0 SR10 FP25
Java 7.1 SR4 FP25
Java 8.0 SR5 FP15
  04/201816Java 7.0 SR10 FP20
Java 7.1 SR4 FP20
Java 8.0 SR5 FP10
  12/201715Java 6.0 SR16 FP55
Java 6 2.6 SR8 FP55
Java 7.0 SR10 FP15
Java 7.1 SR4 FP15
Java 8.0 SR5 FP5
  9/201714Java 6.0 SR16 FP50
Java 6 2.6 SR8 FP50
Java 7.0 SR10 FP10
Java 7.1 SR4 FP10
Java 8.0 SR4 FP10
  6/201713Java 6.0 SR16 FP45
Java 6 2.6 SR8 FP45
Java 7.0 SR10 FP5
Java 7.1 SR4 FP5
Java 8.0 SR4 FP5
  4/201712Java 6.0 SR16 FP41
Java 6 2.6 SR8 FP41
Java 7.0 SR10 FP1
Java 7.1 SR4 FP1
Java 8.0 SR4 FP1
  9/201611Java 6.0 SR16 FP30
Java 6 2.6 SR8 FP30
Java 7.0 SR9 FP50
Java 7.1 SR3 FP50
Java 8.0 SR3 FP10
  06/201610Java 6.0 SR16 FP25
Java 6 2.6 SR8 FP25
Java 7.0 SR9 FP40
Java 7.1 SR3 FP40
Java 8.0 SR3
  03/20169Java 6.0 SR16 FP20
Java 6 2.6 SR8 FP20
Java 7.0 SR9 FP30
Java 7.1 SR3 FP30
Java 8.0 SR2 FP10
  12/20158Java 6.0 SR16 FP15
Java 6 2.6 SR8 FP15
Java 7.0 SR9 FP20
Java 7.1 SR3 FP20
Java 8.0 SR2
  08/20157Java 6.0 SR16 FP7
Java 6 2.6 SR8 FP7
Java 7.0 SR9 FP10
Java 7.1 SR3 FP10
Java 8.0 SR1 FP10
  05/20156Java 6 2.6 SR8 FP4
Java 7.0 SR9
Java 7.1 SR3
Java 8.0 SR1
  04/20155

Supporting Java 8.0 GA released on 7.2. More details see page: News of Java on IBM i

Some performance fixes are included.

  12/20144JDK 6.0 SR16 FP2
JDK 6 2.6 SR8 FP2
JDK 7.0 SR8
JDK 7.1 SR2
  09/20143JDK 6.0 SR16 FP1
JDK 6 2.6 SR8 FP1
JDK 7.0 SR7 FP1
JDK 7.1 SR1 FP1
  07/20142JDK 6.0 SR16
JDK 6 2.6 SR8
JDK 7.0 SR7
JDK 7.1 SR1
SF99572IBM i 7.101/202248Java 7.0 SR11
Java 7.1 SR5
Java 8.0 SR7
  10/202147Java 7.0 SR10 FP90
Java 7.1 SR4 FP90
Java 8.0 SR6 FP35
  07/202146
Java 7.0 SR10 FP85
Java 7.1 SR4 FP85
Java 8.0 SR6 FP30

Note:

TLS 1.0 and 1.1 are disabled by default

  05/202145Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25
  03/202144Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25
  01/202143Java 7.0 SR10 FP75
Java 7.1 SR4 FP75
Java 8.0 SR6 FP20
  09/202042Java 7.0 SR10 FP70
Java 7.1 SR4 FP70
Java 8.0 SR6 FP15
  06/202041Java 7.0 SR10 FP65
Java 7.1 SR4 FP65
Java 8.0 SR6 FP10
  03/202040Java 7.0 SR10 FP60
Java 7.1 SR4 FP60
Java 8.0 SR6 FP5
  01/202039Java 7.0 SR10 FP55
Java 7.1 SR4 FP55
Java 8.0 SR6
  09/201938Java 7.0 SR10 FP50
Java 7.1 SR4 FP50
Java 8.0 SR5 FP40
  07/201937

Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

Note: Fix a hot issue

  06/201936Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35
  03/201935Java 7.0 SR10 FP40
Java 7.1 SR4 FP40
Java 8.0 SR5 FP30
  12/201834Java 7.0 SR10 FP35
Java 7.1 SR4 FP35
Java 8.0 SR5 FP25
  09/201833Java 7.0 SR10 FP30
Java 7.1 SR4 FP30
Java 8.0 SR5 FP20
  06/201832Java 7.0 SR10 FP25
Java 7.1 SR4 FP25
Java 8.0 SR5 FP15
  04/201831Java 7.0 SR10 FP20
Java 7.1 SR4 FP20
Java 8.0 SR5 FP10
  12/201730Java 6.0 SR16 FP55
Java 6 2.6 SR8 FP55
Java 7.0 SR10 FP15
Java 7.1 SR4 FP15
Java 8.0 SR5 FP5
  09/201729Java 6.0 SR16 FP50
Java 6 2.6 SR8 FP50
Java 7.0 SR10 FP10
Java 7.1 SR4 FP10
Java 8.0 SR4 FP10
  06/201728Java 6.0 SR16 FP45
Java 6 2.6 SR8 FP45
Java 7.0 SR10 FP5
Java 7.1 SR4 FP5
Java 8.0 SR4 FP5
  04/201727Java 6.0 SR16 FP41
Java 6 2.6 SR8 FP41
Java 7.0 SR10 FP1
Java 7.1 SR4 FP1
Java 8.0 SR4 FP1
  09/201626Java 6.0 SR16 FP30
Java 6 2.6 SR8 FP30
Java 7.0 SR9 FP50
Java 7.1 SR3 FP50
Java 8.0 SR3 FP10
  06/201625Java 6.0 SR16 FP25
Java 6 2.6 SR8 FP25
Java 7.0 SR9 FP40
Java 7.1 SR3 FP40
Java 8.0 SR3
  03/201624Java 6.0 SR16 FP20
Java 6 2.6 SR8 FP20
Java 7.0 SR9 FP30
Java 7.1 SR3 FP30
Java 8.0 SR2 FP10
  12/201523Java 6.0 SR16 FP15
Java 6 2.6 SR8 FP15
Java 7.0 SR9 FP20
Java 7.1 SR3 FP20
Java 8.0 SR2
  08/201522Java 6.0 SR16 FP7
Java 6 2.6 SR8 FP7
Java 7.0 SR9 FP10
Java 7.1 SR3 FP10
Java 8.0 SR1 FP10
  05/201521Java 5.0 SR16 FP10
Java 6.0 SR16 FP4
Java 6 2.6 SR8 FP4
Java 7.0 SR9
Java 7.1 SR3
Java 8.0 SR1
  04/201520

Supporting Java 80 GA released on i 7.1. More details see page: News of Java on IBM i.

Some performance fixes are included

  12/201419JDK 6.0 SR16 FP2
JDK 6 2.6 SR8 FP2
JDK 7.0 SR8
JDK 7.1 SR2
  09/201418JDK 5.0 SR16 FP6
JDK 6.0 SR16 FP1
JDK 6 2.6 SR8 FP1
JDK 7.0 SR7 FP1
JDK 7.1 SR1 FP1
  07/201417JDK 5.0 SR16 FP6
JDK 6.0 SR16
JDK 6 2.6 SR8
JDK 7.0 SR7
JDK 7.1 SR1
  03/201416JDK 5.0 SR16 FP5
JDK 6.0 SR15 FP1
JDK 6 2.6 SR7 FP1
JDK 7.0 SR6 FP1
  12/201315JDK 5.0 SR16 FP4
JDK 6.0 SR15
JDK 6 2.6 SR7
JDK 7.0 SR6
JDK 7.1 GA
  08/201314JDK 5.0 SR16 FP3
JDK 6.0 SR14
JDK 6 2.6 SR6
JDK 7.0 SR5
  05/201313JDK 5.0 SR16
JDK 6.0 SR13
JDK 6 2.6 SR5
JDK 7.0 SR4
  01/201312JDK 5.0 SR15
JDK 6.0 SR12
JDK 6 2.6 SR4
JDK 7.0 SR3
  01/201311JDK 142 SR13 FP13
JDK 5.0 SR14
JDK 6.0 SR11
JDK 6 2.6 SR3
JDK 7.0 SR2
  09/201210Fix some special CCSID issues on JDK 6 2.6 and JDK 7.0
  07/20129JDK 142 SR13 FP12
JDK 5.0 SR13 FP1
JDK 6.0 SR10 FP1
JDK 6 2.6 SR2
JDK 7.0 SR1
  03/20128JDK 142 SR13 FP11
JDK 5.0 SR13
JDK 6.0 SR10
JDK 6 2.6 SR1
  12/20117The minimum required level for JDK 7.0 support
  07/20116JDK 6 2.6 enabled
  02/20115JDK 142 FP8 + CVE-2010-4476
JDK 5.0 SR12 + CVE-2010-4476
JDK 6.0 SR9 + CVE-2010-4476

 

Java on IBM i follows the industry standards for Java technology. IBM i provides the support for almost all the latest Service Releases(SR) and/or Fix Pack(FP) for all supported JDKs. The following table shows the latest SR/FP supported on IBM i, and their release date.

 

JDKLatest SR/FPDate ReleasedV5R4 PTFsi 6.1 & i 7.1 PTFsi 7.2 PTFsi 7.3 PTFsi 7.4 PTFsi 7.5 PTFsImportant Updates
IBM Technology for Java 17         
 SR17 FP708/2023N/AN/AN/AN/A ** 
 GA03/2023N/AN/AN/AN/A** 
IBM Technology for Java 11         
 SR19 FP708/2023N/AN/AN/A *** 
 SR1701/2023N/AN/AN/A*** 
 SR16 FP110/2022N/AN/AN/A*** 
 SR1507/2022N/AN/AN/A*** 
 SR14 FP103/2022N/AN/AN/A*** 
 SR1301/2022N/AN/AN/A**  
 SR1210/2021N/AN/AN/A**  
 SR1107/2021N/AN/AN/A**  
IBM Technology for Java 8.0         
 SR8 FP508/2023N/AN/AN/A*** 
 SR7FP2001/2023N/AN/A****The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20
 SR7FP1510/2022N/AN/A**** 
 SR7FP1007/2022N/AN/A**** 
 SR7 FP503/2022N/AN/A**** 
 SR701/2022N/A*     
 SR6 FP3510/2021N/A*     
 SR6 FP3007/2021N/A*    
 SR6 FP2505/2021N/A
SI76104
SI76115
    We do not support IBMJCEPLUS by default on i 7.1.
 SR6 FP2503/2021N/A*     
 SR6 FP2001/2021N/A*     
 SR6 FP1509/2020N/A*     
 SR6 FP1006/2020N/A*     
 SR6 FP503/2020N/A*     
 SR601/2020N/A*     
 SR5 FP4009/2019N/A*     
 SR5 FP3507/2019N/A*     Fix a hot issue: Update libjclse29.so to use IBM i version
 SR5 FP3506/2019N/A*     
 SR5 FP3003/2019N/A*     
 SR5 FP2512/2018N/A*     
 SR5 FP2009/2018N/A*     
 SR5 FP1506/2018N/A*     
 SR5 FP1004/2018N/A*     
 SR5 FP512/2017N/A*     
 SR511/2017N/A*     
 SR4 FP109/2017N/A*     
 SR4 FP56/2017N/A*     
 SR4 FP14/2017N/A*     
 SR3 FP2012/2016N/A

32bit :

SI62990  SI62976
64bit:

SI62991  SI62973

32bit:

SI62992  SI62974
64bit:

SI62993  SI62972

32bit:

SI62994  SI62981
64bit:

SI62995  SI62983

  

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will fail. Here’s the work around if you encounter it with WAS
This will also work for other applications with similar changes.
 SR3 FP1009/2016N/A*     
 SR306/2016N/A*     
 SR2 FP1003/2016N/A*    Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
 SR212/2015N/A*     
 SR1 FP1008/2015N/A*    0-day vulnerability(CVE-2015-2590) has been fixed.
 SR105/2015N/A*     
 GA04/2015N/A*     
IBM Technology for Java 7.1         
 SR5 FP1510/2022N/AN/A**   
 SR5 FP1007/2022N/AN/A**   
 SR5 FP503/2022N/AN/A**   
 SR501/2022N/A*     
 SR4 FP9010/2021N/A*     
 SR4 FP8507/2021N/A*    
 SR4 FP8003/2021N/A*     
 SR4 FP7501/2021N/A*     
 SR4 FP7009/2020N/A*     
 SR4 FP6506/2020N/A*     
 SR4 FP6003/2020N/A*     
 SR4 FP5501/2020N/A*     
 SR4 FP5009/2019N/A*     
 SR4 FP4506/2019N/A*     
 SR4 FP4003/2019N/A*     
 SR4 FP3512/2018N/A*     
 SR4 FP3009/2018N/A*     
 SR4 FP2506/2018N/A*     
 SR4 FP2004/2018N/A*     
 SR4 FP1512/2017N/A*     
 SR4 FP109/2017N/A*     
 SR4 FP56/2017N/A*     
 SR4 FP14/2017N/A*     
 SR3 FP6012/2016N/A

32bit :

SI63035  SI63028
64bit:

SI63036  SI63031

32bit:

SI63131  SI63029
64bit:

SI63132  SI63032

32bit:

SI63039  SI63030
64bit:

SI63040  SI63033

  

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here’s the work around if you encounter it with WAS
This will also work for other applications with similar changes. 
 SR3 FP5009/2016N/A*     
 SR3 FP4006/2016N/A*     
 SR3 FP3003/2016N/A*    Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
 SR3 FP2012/2015N/A*     
 SR3 FP1008/2015N/A*    0-day vulnerability(CVE-2015-2590) has been fixed.
 SR305/2015N/A*     
 SR212/2014N/A*    

POODLE vulnerability has been fixed. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

 SR1FP109/2014N/A*     
 SR107/2014N/A*     
 GA12/2013N/A*     
IBM Technology for Java 7.0         
 
SR11
FP15
10/2022N/AN/A**   
 SR11 FP1007/2022N/AN/A**   
 SR11 FP503/2022N/AN/A**   
 SR1101/2022N/A*     
 SR10 FP9010/2021N/A*     
 SR10 FP8507/2021N/A*    
 SR10 FP8003/2021N/A*     
 SR10 FP7501/2021N/A*     
 SR10 FP7009/2020N/A*     
 SR10 FP6506/2020N/A*     
 SR10 FP6003/2020N/A*     
 SR10 FP5501/2020N/A*     
 SR10 FP5009/2019N/A*     
 SR10 FP4506/2019N/A*     
 SR10 FP4003/2019N/A*     
 SR10 FP3512/2018N/A*     
 SR10 FP3009/2018N/A*     
 SR10 FP2506/2018N/A*     
 SR10 FP2004/2018N/A*     
 SR10 FP1512/2017N/A*     
 SR10 FP109/2017N/A*     
 SR10 FP56/2017N/A*     
 SR10 FP14/2017N/A*     
 SR9 FP6012/2016N/A

32bit :

SI63010  SI63019  SI63021
64bit:  

32bit:

SI63131  SI63022
64bit:

SI63132  SI63026

32bit:

SI63014  SI63023
64bit:

SI63015  SI63027

  

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here’s the work around if you encounter it with WAS.
This will also work for other applications with similar changes. 
 SR9 FP5009/2016N/A*     
 SR9 FP4006/2016N/A*     
 SR9 FP3003/2016N/A*    Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
 SR9 FP2012/2015N/A*     
 SR9 FP1008/2015N/A*    0-day vulnerability(CVE-2015-2590) has been fixed.
 SR905/2015N/A*     
 SR812/2014N/A*    

POODLE vulnerability has been fixed. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

 SR7FP109/2014N/A*     
 SR707/2014N/A*     
 SR6 FP103/2014N/A*     
 SR612/2013N/A*     
 SR508/2013N/A*    

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537

http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/enhancements-7.html (Although this document is for Java 7, the fix is in all JDKs)

 SR405/2013N/A*     
 SR301/2013N/A*    http://www-01.ibm.com/support/docview.wss?uid=swg21617227

 

SR201/2013N/A*     
 SR109/2012N/A*     
IBM Technology for Java 6 2.6         
 SR8FP5512/2017N/A*     
 SR8FP509/2017N/A*     
 SR8FP456/2017N/A*   
 SR8FP414/2017N/A*   
 SR8FP3512/2016N/A

32bit:

SI63044  SI62978
64bit:

SI63045  SI62979

32bit:

SI63047  SI62982
64bit:

SI63046  SI62980

N/A  

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here’s the work around if you encounter it with WAS

This will also work for other applications with similar changes.  

 SR8FP3009/2016N/A*     
 SR8FP2506/2016N/A*     
 SR8FP2003/2016N/A     Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
 SR8FP1512/2015N/A      
 SR8FP708/2015N/A*    0-day vulnerability(CVE-2015-2590) has been fixed.
 SR8FP405/2015N/A*     
 SR8FP212/2014N/A*    

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

 SR8FP109/2014N/A*     
 SR807/2014N/A*     
 SR7 FP103/2014N/A*     
 SR712/2013N/A*     
 SR608/2013N/A*    

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537

http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/enhancements-7.html (Although this document is for Java 7, the fix is in all JDKs)

 SR504/2013N/A*     
 SR401/2013N/A*    http://www-01.ibm.com/support/docview.wss?uid=swg21617227

 

SR301/2013N/A*     
 SR209/2012N/A*     
IBM Technology for Java 6.0         
 SR16FP5512/2017N/A*     
 SR16FP509/2017N/A*     
 SR16FP456/2017N/A*     
 SR16FP414/2017N/A      
 SR16FP3512/2016N/A

32bit:  

SI63003  SI62968
64bit:  

SI63002  SI62969

32bit:  

SI63001  SI62970
64bit:  

SI63000  SI62971

N/A  

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here is the work around if you encounter it with WAS. This also work for other applications with similar changes.  

 SR16FP3009/2016N/A*     
 SR16FP2506/2016N/A*     
 SR16FP2003/2016N/A*    Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
 SR16FP1512/2015N/A*     
 SR16FP708/2015N/A*    0-day vulnerability(CVE-2015-2590) has been fixed.
 SR16FP405/2015N/A*     
 SR16FP212/2014N/A*    

POODLE vulnerability has been fixed. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

 SR16FP109/2014N/A*     
 SR1607/2014N/A*     
 SR15 FP103/2014N/A*     
 SR1512/2013N/A*     
 SR1408/2013**    

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537

http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/enhancements-7.html (Although this document is for Java 7, the fix is in all JDKs)

 

SR1304/2013**     
 SR1201/2013**    http://www-01.ibm.com/support/docview.wss?uid=swg21617227
 SR1101/2013**     
 SR1009/2012**     
          

NOTE:

*: These SRs are already in the PTF group, and the dates released are also aligned with the PTF group release dates. Please refer the PTF group table above for the specific PTF group level.  We suggest you upgrade to the latest PTF groups to avoid any known issues.

 

 

[{"Business Unit":{"code":"BU070","label":"IBM Infrastructure"},"Product":{"code":"SWG60","label":"IBM i"},"Component":"","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"All Versions","Edition":"","Line of Business":{"code":"LOB68","label":"Power HW"}}]

Document Information

Modified date:
30 December 2025

UID

ibm11117857