IBM Support

PTF Groups and latest SR, FP

General Page

PTF groups and latest SR, FP
You are in: IBM i Technology Updates > Java on IBM i > PTF groups and latest SR, FP.

To help customers easily get the latest Java technology on IBM i, we group all the necessary PTFs into a PTF Group on every release of IBM i.
The following table shows the Java PTF Groups for each release, as well as some of the important enhancements. Click on the links to learn more.

PTF Group Number Release Date Level Enhancements
SF99955
IBM i
7.5
07/2024 10
Java 8.0 SR8 FP25
Java 11 11.0.23+9
Java 17 17.0.11+9
03/2024 9
Java 8.0 SR8 FP20
Java 11 11.0.22+7
Java 17 17.0.10+7
01/2024 8
Java 8.0 SR8 FP15
Java 11 11.0.21.0
Java 17 17.0.9+9
11/2023 7
Java 8.0 SR8 FP10
Java 11 11.0.20.1+1
Java 17 17.0.8.1+1
08/2023 6
Java 8.0 SR8 FP5
Java 11 SR19 FP7
Java 17 SR17 FP7
03/2023 5 Java 17 GA
01/2023 4
Java 8.0 SR7 FP20
Java 11 SR17
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20
10/2022 3
Java 8.0 SR7 FP15
Java 11 SR16 FP1
07/2022 2
Java 8.0 SR7 FP10
Java 11 SR15
04/2022 1
Java 8.0 SR7 FP5
Java 11 SR14 FP1
SF99665 IBM i 7.4
07/2024 23
Java 8.0 SR8 FP25
Java 11 11.0.23+9
Java 17 17.0.11+9
03/2024 22
Java 8.0 SR8 FP20
Java 11 11.0.22+7
Java 17 17.0.10+7
01/2024 21
Java 8.0 SR8 FP15
Java 11 11.0.21.0
Java 17 17.0.9+9
11/2023 20
Java 8.0 SR8 FP10
Java 11 11.0.20.1+1
Java 17 17.0.8.1+1
08/2023 19
Java 8.0 SR8 FP5
Java 11 SR19 FP7
Java 17 SR17 FP7
03/2023 18 Java17 GA
01/2023 17
Java 8.0 SR7 FP20
Java 11 SR17
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20
10/2022 16
Java 8.0 SR7 FP15
Java 11 SR16 FP1
07/2022 15
Java 8.0 SR7 FP10
Java 11 SR15
03/2022 14
Java 8.0 SR7 FP5
Java 11 SR14 FP1
01/2022 13
Java 8.0 SR7
Java 11 SR13
10/2021 12
Java 8.0 SR6 FP35
Java 11 SR12
07/2021 11
Java 8.0 SR6 FP30
Java 11 SR11
Note:
TLS 1.0 and 1.1 are disabled by default
03/2021 10 Java 8.0 SR6 FP25
01/2021 9 Java 8.0 SR6 FP20
09/2020 8 Java 8.0 SR6 FP15
06/2020 7 Java 8.0 SR6 FP10
03/2020 6 Java 8.0 SR6 FP5
01/2020 5 Java 8.0 SR6

09/2019 4 Java 8.0 SR5 FP40

07/2019 3

Java 8.0 SR5 FP35

Note: Fix a hot issue

06/2019 2 Java 8.0 SR5 FP35
SF99725 IBM i 7.3
07/2024 33
Java 8.0 SR8 FP25
Java 11 11.0.23+9
03/2024 32
Java 8.0 SR8 FP20
Java 11 11.0.22+7
01/2024 31
Java 8.0 SR8 FP15
Java 11 11.0.21.0
11/2023 30
Java 8.0 SR8 FP10
Java 11 11.0.20.1+1
08/2023 29
 Java 8.0 SR8 FP5
 Java 11 SR19 FP7
01/2023 28
Java 8.0 SR7 FP20
Java 11 SR17
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20
10/2022 27
Java 7.0 SR11 FP15
Java 7.1 SR5 FP15
Java 8.0 SR7 FP15
Java 11 SR16 FP1
07/2022 26
Java 7.0 SR11 FP10
Java 7.1 SR5 FP10
Java 8.0 SR7 FP10
Java 11 SR15
03/2022 25
Java 7.0 SR11 FP5
Java 7.1 SR5 FP5
Java 8.0 SR7 FP5
Java 11 SR14 FP1
01/2022 24
Java 7.0 SR11
Java 7.1 SR5
Java 8.0 SR7
Java 11 SR13
10/2021 23
Java 7.0 SR10 FP90
Java 7.1 SR4 FP90
Java 8.0 SR6 FP35
Java 11 SR12
07/2021 22
Java 7.0 SR10 FP85
Java 7.1 SR4 FP85
Java 8.0 SR6 FP30
Java 11 SR11
Note:
TLS 1.0 and 1.1 are disabled by default
03/2021 21 Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25
01/2021 20 Java 7.0 SR10 FP75
Java 7.1 SR4 FP75
Java 8.0 SR6 FP20
09/2020 19 Java 7.0 SR10 FP70
Java 7.1 SR4 FP70
Java 8.0 SR6 FP15
06/2020 18 Java 7.0 SR10 FP65
Java 7.1 SR4 FP65
Java 8.0 SR6 FP10
03/2020 17 Java 7.0 SR10 FP60
Java 7.1 SR4 FP60
Java 8.0 SR6 FP5
01/2020 16 Java 7.0 SR10 FP55
Java 7.1 SR4 FP55
Java 8.0 SR6

09/2019 15

Java 7.0 SR10 FP50
Java 7.1 SR4 FP50
Java 8.0 SR5 FP40

07/2019 14

Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

Note: Fix a hot issue

06/2019 13 Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

03/2019 12 Java 7.0 SR10 FP40
Java 7.1 SR4 FP40
Java 8.0 SR5 FP30

12/2018 11 Java 7.0 SR10 FP35
Java 7.1 SR4 FP35
Java 8.0 SR5 FP25

09/2018 10 Java 7.0 SR10 FP30
Java 7.1 SR4 FP30
Java 8.0 SR5 FP20

06/2018 9 Java 7.0 SR10 FP25
Java 7.1 SR4 FP25
Java 8.0 SR5 FP15
04/2018 8 Java 7.0 SR10 FP20
Java 7.1 SR4 FP20
Java 8.0 SR5 FP10
12/2017 7 Java 7.0 SR10 FP15
Java 7.1 SR4 FP15
Java 8.0 SR5 FP5

09/2017 6 Java 7.0 SR10 FP10
Java 7.1 SR4 FP10
Java 8.0 SR4 FP10

06/2017 5 Java 7.0 SR10 FP5
Java 7.1 SR4 FP5
Java 8.0 SR4 FP5

04/2017 4 Java 7.0 SR10 FP1
Java 7.1 SR4 FP1
Java 8.0 SR4 FP1

09/2016 3 Java 7.0 SR9 FP50
Java 7.1 SR3 FP50
Java 8.0 SR3 FP10
06/2016 2 Java 7.0 SR9 FP40
Java 7.1 SR3 FP40
Java 8.0 SR3
04/2016 1 Java 7.0 SR9 FP30
Java 7.1 SR3 FP30
Java 8.0 SR2 FP10
SF99716 IBM i 7.2
01/2023 38
Java 8.0 SR7 FP20
Note:
The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20
10/2022 37
Java 7.0 SR11 FP15
Java 7.1 SR5 FP15
Java 8.0 SR7 FP15
07/2022 36
Java 7.0 SR11 FP10
Java 7.1 SR5 FP10
Java 8.0 SR7 FP10
03/2022 35
Java 7.0 SR11 FP5
Java 7.1 SR5 FP5
Java 8.0 SR7 FP5
01/2022 34
Java 7.0 SR11
Java 7.1 SR5
Java 8.0 SR7
10/2021 33 Java 7.0 SR10 FP90
Java 7.1 SR4 FP90
Java 8.0 SR6 FP35
07/2021 32
Java 7.0 SR10 FP85
Java 7.1 SR4 FP85
Java 8.0 SR6 FP30
Note:
TLS 1.0 and 1.1 are disabled by default
03/2021 31 Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25
01/2021 30 Java 7.0 SR10 FP75
Java 7.1 SR4 FP75
Java 8.0 SR6 FP20
09/2020 27 Java 7.0 SR10 FP70
Java 7.1 SR4 FP70
Java 8.0 SR6 FP15
06/2020 26 Java 7.0 SR10 FP65
Java 7.1 SR4 FP65
Java 8.0 SR6 FP10
03/2020 25 Java 7.0 SR10 FP60
Java 7.1 SR4 FP60
Java 8.0 SR6 FP5
01/2020 24 Java 7.0 SR10 FP55
Java 7.1 SR4 FP55
Java 8.0 SR6
09/2019 23 Java 7.0 SR10 FP50
Java 7.1 SR4 FP50
Java 8.0 SR5 FP40
07/2019 22 Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

Note: Fix a hot issue

06/2019 21 Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35
03/2019 20 Java 7.0 SR10 FP40
Java 7.1 SR4 FP40
Java 8.0 SR5 FP30
12/2018 19 Java 7.0 SR10 FP35
Java 7.1 SR4 FP35
Java 8.0 SR5 FP25
09/2018 18 Java 7.0 SR10 FP30
Java 7.1 SR4 FP30
Java 8.0 SR5 FP20
06/2018 17 Java 7.0 SR10 FP25
Java 7.1 SR4 FP25
Java 8.0 SR5 FP15
04/2018 16 Java 7.0 SR10 FP20
Java 7.1 SR4 FP20
Java 8.0 SR5 FP10
12/2017 15 Java 6.0 SR16 FP55
Java 6 2.6 SR8 FP55
Java 7.0 SR10 FP15
Java 7.1 SR4 FP15
Java 8.0 SR5 FP5
9/2017 14 Java 6.0 SR16 FP50
Java 6 2.6 SR8 FP50
Java 7.0 SR10 FP10
Java 7.1 SR4 FP10
Java 8.0 SR4 FP10
6/2017 13 Java 6.0 SR16 FP45
Java 6 2.6 SR8 FP45
Java 7.0 SR10 FP5
Java 7.1 SR4 FP5
Java 8.0 SR4 FP5
4/2017 12 Java 6.0 SR16 FP41
Java 6 2.6 SR8 FP41
Java 7.0 SR10 FP1
Java 7.1 SR4 FP1
Java 8.0 SR4 FP1
9/2016 11 Java 6.0 SR16 FP30
Java 6 2.6 SR8 FP30
Java 7.0 SR9 FP50
Java 7.1 SR3 FP50
Java 8.0 SR3 FP10
06/2016 10 Java 6.0 SR16 FP25
Java 6 2.6 SR8 FP25
Java 7.0 SR9 FP40
Java 7.1 SR3 FP40
Java 8.0 SR3
03/2016 9 Java 6.0 SR16 FP20
Java 6 2.6 SR8 FP20
Java 7.0 SR9 FP30
Java 7.1 SR3 FP30
Java 8.0 SR2 FP10
12/2015 8 Java 6.0 SR16 FP15
Java 6 2.6 SR8 FP15
Java 7.0 SR9 FP20
Java 7.1 SR3 FP20
Java 8.0 SR2
08/2015 7 Java 6.0 SR16 FP7
Java 6 2.6 SR8 FP7
Java 7.0 SR9 FP10
Java 7.1 SR3 FP10
Java 8.0 SR1 FP10
05/2015 6 Java 6 2.6 SR8 FP4
Java 7.0 SR9
Java 7.1 SR3
Java 8.0 SR1
04/2015 5

Supporting Java 8.0 GA released on 7.2. More details see page: News of Java on IBM i

Some performance fixes are included.

12/2014 4 JDK 6.0 SR16 FP2
JDK 6 2.6 SR8 FP2
JDK 7.0 SR8
JDK 7.1 SR2
09/2014 3 JDK 6.0 SR16 FP1
JDK 6 2.6 SR8 FP1
JDK 7.0 SR7 FP1
JDK 7.1 SR1 FP1
07/2014 2 JDK 6.0 SR16
JDK 6 2.6 SR8
JDK 7.0 SR7
JDK 7.1 SR1
SF99572 IBM i 7.1 01/2022 48 Java 7.0 SR11
Java 7.1 SR5
Java 8.0 SR7
10/2021 47 Java 7.0 SR10 FP90
Java 7.1 SR4 FP90
Java 8.0 SR6 FP35
07/2021 46
Java 7.0 SR10 FP85
Java 7.1 SR4 FP85
Java 8.0 SR6 FP30
Note:
TLS 1.0 and 1.1 are disabled by default
05/2021 45 Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25
03/2021 44 Java 7.0 SR10 FP80
Java 7.1 SR4 FP80
Java 8.0 SR6 FP25
01/2021 43 Java 7.0 SR10 FP75
Java 7.1 SR4 FP75
Java 8.0 SR6 FP20
09/2020 42 Java 7.0 SR10 FP70
Java 7.1 SR4 FP70
Java 8.0 SR6 FP15
06/2020 41 Java 7.0 SR10 FP65
Java 7.1 SR4 FP65
Java 8.0 SR6 FP10
03/2020 40 Java 7.0 SR10 FP60
Java 7.1 SR4 FP60
Java 8.0 SR6 FP5
01/2020 39

Java 7.0 SR10 FP55
Java 7.1 SR4 FP55
Java 8.0 SR6

09/2019 38 Java 7.0 SR10 FP50
Java 7.1 SR4 FP50
Java 8.0 SR5 FP40
07/2019 37 Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35

Note: Fix a hot issue

06/2019 36 Java 7.0 SR10 FP45
Java 7.1 SR4 FP45
Java 8.0 SR5 FP35
03/2019 35 Java 7.0 SR10 FP40
Java 7.1 SR4 FP40
Java 8.0 SR5 FP30
12/2018 34 Java 7.0 SR10 FP35
Java 7.1 SR4 FP35
Java 8.0 SR5 FP25
09/2018 33 Java 7.0 SR10 FP30
Java 7.1 SR4 FP30
Java 8.0 SR5 FP20
06/2018 32 Java 7.0 SR10 FP25
Java 7.1 SR4 FP25
Java 8.0 SR5 FP15
04/2018 31 Java 7.0 SR10 FP20
Java 7.1 SR4 FP20
Java 8.0 SR5 FP10
12/2017 30 Java 6.0 SR16 FP55
Java 6 2.6 SR8 FP55
Java 7.0 SR10 FP15
Java 7.1 SR4 FP15
Java 8.0 SR5 FP5
09/2017 29 Java 6.0 SR16 FP50
Java 6 2.6 SR8 FP50
Java 7.0 SR10 FP10
Java 7.1 SR4 FP10
Java 8.0 SR4 FP10
06/2017 28 Java 6.0 SR16 FP45
Java 6 2.6 SR8 FP45
Java 7.0 SR10 FP5
Java 7.1 SR4 FP5
Java 8.0 SR4 FP5
04/2017 27 Java 6.0 SR16 FP41
Java 6 2.6 SR8 FP41
Java 7.0 SR10 FP1
Java 7.1 SR4 FP1
Java 8.0 SR4 FP1
09/2016 26 Java 6.0 SR16 FP30
Java 6 2.6 SR8 FP30
Java 7.0 SR9 FP50
Java 7.1 SR3 FP50
Java 8.0 SR3 FP10
06/2016 25 Java 6.0 SR16 FP25
Java 6 2.6 SR8 FP25
Java 7.0 SR9 FP40
Java 7.1 SR3 FP40
Java 8.0 SR3
03/2016 24 Java 6.0 SR16 FP20
Java 6 2.6 SR8 FP20
Java 7.0 SR9 FP30
Java 7.1 SR3 FP30
Java 8.0 SR2 FP10
12/2015 23 Java 6.0 SR16 FP15
Java 6 2.6 SR8 FP15
Java 7.0 SR9 FP20
Java 7.1 SR3 FP20
Java 8.0 SR2
08/2015 22 Java 6.0 SR16 FP7
Java 6 2.6 SR8 FP7
Java 7.0 SR9 FP10
Java 7.1 SR3 FP10
Java 8.0 SR1 FP10
05/2015 21 Java 5.0 SR16 FP10
Java 6.0 SR16 FP4
Java 6 2.6 SR8 FP4
Java 7.0 SR9
Java 7.1 SR3
Java 8.0 SR1
04/2015 20

Supporting Java 80 GA released on i 7.1. More details see page: News of Java on IBM i.

Some performance fixes are included

12/2014 19 JDK 6.0 SR16 FP2
JDK 6 2.6 SR8 FP2
JDK 7.0 SR8
JDK 7.1 SR2
09/2014 18 JDK 5.0 SR16 FP6
JDK 6.0 SR16 FP1
JDK 6 2.6 SR8 FP1
JDK 7.0 SR7 FP1
JDK 7.1 SR1 FP1
07/2014 17 JDK 5.0 SR16 FP6
JDK 6.0 SR16
JDK 6 2.6 SR8
JDK 7.0 SR7
JDK 7.1 SR1
03/2014 16 JDK 5.0 SR16 FP5
JDK 6.0 SR15 FP1
JDK 6 2.6 SR7 FP1
JDK 7.0 SR6 FP1
12/2013 15 JDK 5.0 SR16 FP4
JDK 6.0 SR15
JDK 6 2.6 SR7
JDK 7.0 SR6
JDK 7.1 GA
08/2013 14 JDK 5.0 SR16 FP3
JDK 6.0 SR14
JDK 6 2.6 SR6
JDK 7.0 SR5
05/2013 13 JDK 5.0 SR16
JDK 6.0 SR13
JDK 6 2.6 SR5
JDK 7.0 SR4
01/2013 12 JDK 5.0 SR15
JDK 6.0 SR12
JDK 6 2.6 SR4
JDK 7.0 SR3
01/2013 11 JDK 142 SR13 FP13
JDK 5.0 SR14
JDK 6.0 SR11
JDK 6 2.6 SR3
JDK 7.0 SR2
09/2012 10

Fix some special CCSID issues on JDK 6 2.6 and JDK 7.0

07/2012 9 JDK 142 SR13 FP12
JDK 5.0 SR13 FP1
JDK 6.0 SR10 FP1
JDK 6 2.6 SR2
JDK 7.0 SR1
03/2012 8 JDK 142 SR13 FP11
JDK 5.0 SR13
JDK 6.0 SR10
JDK 6 2.6 SR1
12/2011 7 The minimum required level for JDK 7.0 support
07/2011 6 JDK 6 2.6 enabled
02/2011 5 JDK 142 FP8 + CVE-2010-4476
JDK 5.0 SR12 + CVE-2010-4476
JDK 6.0 SR9 + CVE-2010-4476

Java on IBM i follows the industry standards for Java technology. IBM i provides the support for almost all the latest Service Releases(SR) and/or Fix Pack(FP) for all supported JDKs. The following table shows the latest SR/FP supported on IBM i, and their release date.

JDK Latest SR/FP Date Released V5R4 PTFs i 6.1 & i 7.1 PTFs i 7.2 PTFs i 7.3 PTFs i 7.4 PTFs i 7.5 PTFs Important Updates
IBM Technology for Java 17
SR17 FP7 08/2023 N/A N/A N/A N/A  * *
GA 03/2023 N/A N/A N/A N/A * *
IBM Technology for Java 11
SR19 FP7 08/2023 N/A N/A N/A  * * *
SR17 01/2023 N/A N/A N/A * * *
SR16 FP1 10/2022 N/A N/A N/A * * *
SR15 07/2022 N/A N/A N/A * * *
SR14 FP1 03/2022 N/A N/A N/A * * *
SR13 01/2022 N/A N/A N/A * *
SR12 10/2021 N/A N/A N/A * *
SR11 07/2021 N/A N/A N/A * *
IBM Technology for Java 8.0
SR8 FP5 08/2023 N/A N/A N/A * * *
SR7FP20 01/2023 N/A N/A * * * * The JGSS Kerberos encryption types des3-cbc-sha1, and rc4-hmac are now disabled by default in SR7 FP20
SR7FP15 10/2022 N/A N/A * * * *
SR7FP10 07/2022 N/A N/A * * * *
SR7 FP5 03/2022 N/A N/A * * * *
SR7 01/2022 N/A *
SR6 FP35 10/2021 N/A *
SR6 FP30 07/2021 N/A *
SR6 FP25 05/2021 N/A
SI76104
SI76115
We do not support IBMJCEPLUS by default on i 7.1.
SR6 FP25 03/2021 N/A *
SR6 FP20 01/2021 N/A *
SR6 FP15 09/2020 N/A *
SR6 FP10 06/2020 N/A *
SR6 FP5 03/2020 N/A *
SR6 01/2020 N/A *
SR5 FP40 09/2019 N/A *
SR5 FP35 07/2019 N/A *  Fix a hot issue: Update libjclse29.so to use IBM i version
SR5 FP35 06/2019 N/A *
SR5 FP30 03/2019 N/A *
SR5 FP25 12/2018 N/A *
SR5 FP20 09/2018 N/A *
SR5 FP15 06/2018 N/A *
SR5 FP10 04/2018 N/A *
SR5 FP5 12/2017 N/A *
SR5 11/2017 N/A *
SR4 FP10 9/2017 N/A *
SR4 FP5 6/2017 N/A *
SR4 FP1 4/2017 N/A *
SR3 FP20 12/2016 N/A

32bit :

SI62990  SI62976
64bit:

SI62991  SI62973

32bit:

SI62992  SI62974
64bit:

SI62993  SI62972

32bit:

SI62994  SI62981
64bit:

SI62995  SI62983

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will fail. Here’s the work around if you encounter it with WAS
This will also work for other applications with similar changes.
SR3 FP10 09/2016 N/A *
SR3 06/2016 N/A *
SR2 FP10 03/2016 N/A * Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
SR2 12/2015 N/A *
SR1 FP10 08/2015 N/A * 0-day vulnerability(CVE-2015-2590) has been fixed.
SR1 05/2015 N/A *
GA 04/2015 N/A *
IBM Technology for Java 7.1
SR5 FP15 10/2022 N/A N/A * *
SR5 FP10 07/2022 N/A N/A * *
SR5 FP5 03/2022 N/A N/A * *
SR5 01/2022 N/A *
SR4 FP90 10/2021 N/A *
SR4 FP85 07/2021 N/A *
SR4 FP80 03/2021 N/A *
SR4 FP75 01/2021 N/A *
SR4 FP70 09/2020 N/A *
SR4 FP65 06/2020 N/A *
SR4 FP60 03/2020 N/A *
SR4 FP55 01/2020 N/A *
SR4 FP50 09/2019 N/A *
SR4 FP45 06/2019 N/A *
SR4 FP40 03/2019 N/A *
SR4 FP35 12/2018 N/A *
SR4 FP30 09/2018 N/A *
SR4 FP25 06/2018 N/A *
SR4 FP20 04/2018 N/A *
SR4 FP15 12/2017 N/A *
SR4 FP10 9/2017 N/A *
SR4 FP5 6/2017 N/A *
SR4 FP1 4/2017 N/A *
SR3 FP60 12/2016 N/A

32bit :

SI63035  SI63028
64bit:

SI63036  SI63031

32bit:

SI63131  SI63029
64bit:

SI63132  SI63032

32bit:

SI63039  SI63030
64bit:

SI63040  SI63033

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here’s the work around if you encounter it with WAS
This will also work for other applications with similar changes. 
SR3 FP50 09/2016 N/A *
SR3 FP40 06/2016 N/A *
SR3 FP30 03/2016 N/A * Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
SR3 FP20 12/2015 N/A *
SR3 FP10 08/2015 N/A * 0-day vulnerability(CVE-2015-2590) has been fixed.
SR3 05/2015 N/A *
SR2 12/2014 N/A *

POODLE vulnerability has been fixed. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

SR1FP1 09/2014 N/A *
SR1 07/2014 N/A *
GA 12/2013 N/A *
IBM Technology for Java 7.0
SR11
FP15
10/2022 N/A N/A * *
SR11 FP10 07/2022 N/A N/A * *
SR11 FP5 03/2022 N/A N/A * *
SR11 01/2022 N/A *
SR10 FP90 10/2021 N/A *
SR10 FP85 07/2021 N/A *
SR10 FP80 03/2021 N/A *
SR10 FP75 01/2021 N/A *
SR10 FP70 09/2020 N/A *
SR10 FP65 06/2020 N/A *
SR10 FP60 03/2020 N/A *
SR10 FP55 01/2020 N/A *
SR10 FP50 09/2019 N/A *
SR10 FP45 06/2019 N/A *
SR10 FP40 03/2019 N/A *
SR10 FP35 12/2018 N/A *
SR10 FP30 09/2018 N/A *
SR10 FP25 06/2018 N/A *
SR10 FP20 04/2018 N/A *
SR10 FP15 12/2017 N/A *
SR10 FP10 9/2017 N/A *
SR10 FP5 6/2017 N/A *
SR10 FP1 4/2017 N/A *
SR9 FP60 12/2016 N/A

32bit :

SI63010  SI63019  SI63021
64bit:  

32bit:

SI63131  SI63022
64bit:

SI63132  SI63026

32bit:

SI63014  SI63023
64bit:

SI63015  SI63027

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here’s the work around if you encounter it with WAS.
This will also work for other applications with similar changes. 
SR9 FP50 09/2016 N/A *
SR9 FP40 06/2016 N/A *
SR9 FP30 03/2016 N/A * Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
SR9 FP20 12/2015 N/A *
SR9 FP10 08/2015 N/A * 0-day vulnerability(CVE-2015-2590) has been fixed.
SR9 05/2015 N/A *
SR8 12/2014 N/A *

POODLE vulnerability has been fixed. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

SR7FP1 09/2014 N/A *
SR7 07/2014 N/A *
SR6 FP1 03/2014 N/A *
SR6 12/2013 N/A *
SR5 08/2013 N/A *

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537

http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/enhancements-7.html (Although this document is for Java 7, the fix is in all JDKs)
SR4 05/2013 N/A *
SR3 01/2013 N/A * http://www-01.ibm.com/support/docview.wss?uid=swg21617227

SR2 01/2013 N/A *
SR1 09/2012 N/A *
IBM Technology for Java 6 2.6
SR8FP55 12/2017 N/A *
SR8FP50 9/2017 N/A *
SR8FP45 6/2017 N/A *
SR8FP41 4/2017 N/A *
SR8FP35 12/2016 N/A

32bit:

SI63044  SI62978
64bit:

SI63045  SI62979

32bit:

SI63047  SI62982
64bit:

SI63046  SI62980

N/A

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here’s the work around if you encounter it with WAS

This will also work for other applications with similar changes.  

SR8FP30 09/2016 N/A *
SR8FP25 06/2016 N/A *
SR8FP20 03/2016 N/A Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
SR8FP15 12/2015 N/A
SR8FP7 08/2015 N/A *

0-day vulnerability(CVE-2015-2590) has been fixed.

SR8FP4 05/2015 N/A *
SR8FP2 12/2014 N/A *

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

SR8FP1 09/2014 N/A *
SR8 07/2014 N/A *
SR7 FP1 03/2014 N/A *
SR7 12/2013 N/A *
SR6 08/2013 N/A *

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537

http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/enhancements-7.html (Although this document is for Java 7, the fix is in all JDKs)
SR5 04/2013 N/A *
SR4 01/2013 N/A * http://www-01.ibm.com/support/docview.wss?uid=swg21617227

SR3 01/2013 N/A *
SR2 09/2012 N/A *
IBM Technology for Java 6.0
SR16FP55 12/2017 N/A *
SR16FP50 9/2017 N/A *
SR16FP45 6/2017 N/A *
SR16FP41 4/2017 N/A
SR16FP35 12/2016 N/A

32bit:  

SI63003  SI62968
64bit:  

SI63002  SI62969

32bit:  

SI63001  SI62970
64bit:  

SI63000  SI62971

N/A

Java on IBM i security updates for the Sept. CVEs.


This change also provides the CMS provider version 2.57, the CMS keystore and stash file created by this CMS provider version can't be understood by IBM i native CMS API. The typical application is WAS platform, it will use IBM i native CMS API to access CMS keystore and stash file which are created by Java CMS provider, and it will failed. Here is the work around if you encounter it with WAS. This also work for other applications with similar changes.  

SR16FP30 09/2016 N/A *
SR16FP25 06/2016 N/A *
SR16FP20 03/2016 N/A * Sloth vulnerability has been fixed. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
SR16FP15 12/2015 N/A *
SR16FP7 08/2015 N/A * 0-day vulnerability(CVE-2015-2590) has been fixed.
SR16FP4 05/2015 N/A *
SR16FP2 12/2014 N/A *

POODLE vulnerability has been fixed. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566) .

The details about the fix and actions required for an application can be found here. http://www-01.ibm.com/support/docview.wss?uid=swg21688165

SR16FP1 09/2014 N/A *
SR16 07/2014 N/A *
SR15 FP1 03/2014 N/A *
SR15 12/2013 N/A *
SR14 08/2013 * *

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537

http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/enhancements-7.html (Although this document is for Java 7, the fix is in all JDKs)

SR13 04/2013 * *
SR12 01/2013 * * http://www-01.ibm.com/support/docview.wss?uid=swg21617227
SR11 01/2013 * *
SR10 09/2012 * *

NOTE:

*: These SRs are already in the PTF group, and the dates released are also aligned with the PTF group release dates. Please refer the PTF group table above for the specific PTF group level.  We suggest you upgrade to the latest PTF groups to avoid any known issues.

[{"Business Unit":{"code":"BU070","label":"IBM Infrastructure"},"Product":{"code":"SWG60","label":"IBM i"},"Component":"","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"All Versions","Edition":"","Line of Business":{"code":"LOB68","label":"Power HW"}}]

Document Information

Modified date:
06 July 2024

UID

ibm11117857