java

JDK 25.0.2 Release Notes

Java™ SE Development Kit 25.0.2 (JDK 25.0.2)

Release date: January 20, 2026

The full version string for this update release is 25.0.2+10 (where "+" means "build"). The version number is 25.0.2. This JDK conforms to version 25 of the Java SE Specification (JSR 400 2025-09-16).

 

IANA TZ Data 2025b

For more information, refer to Timezone Data Versions in the JRE Software.

 

Security Baselines

The security baselines for the Java Runtime at the time of the release of JDK 25.0.2 are specified in the following table:

Java Family Version Security Baseline (Full Version String)
2525.0.2+10
2121.0.10+8
1717.0.18+8
1111.0.30+7
81.8.0_481-b10

 

Keeping the JDK up to Date

Oracle recommends that the JDK is updated with each Critical Patch Update. In order to determine if a release is the latest, the Security Baseline page can be used to determine which is the latest version for each release family.

Critical patch updates, which contain security vulnerability fixes, are announced one year in advance on Critical Patch Updates, Security Alerts and Bulletins. It is not recommended that this JDK (version 25.0.2) be used after the next critical patch update scheduled for April 21, 2026.

Java Management Service, available to all users, can help you find vulnerable Java versions in your systems. Java SE Subscribers and customers running in Oracle Cloud can use Java Management Service to update Java Runtimes and to do further security reviews like identifying potentially vulnerable third party libraries used by your Java programs. Existing Java Management Service user click here to log in to your dashboard. The Java Management Service Documentation provides a list of features available to everyone and those available only to customers. Learn more about using Java Management Service to monitor and secure your Java Installations.

 

New Features

core-libs/java.rmi
 Endpoint Identification Enabled By Default for RMI Connections Over TLS (JDK-8341496 (not public))

RMI will use TLS connections if the javax.rmi.ssl.SslRMIClientSocketFactory class is used. These connections now have TLS endpoint identification enabled by default. This may cause some previously-working TLS connections to fail. If this occurs, ensure that the certificate presented by the server has a Subject Alternative Name that matches the server's hostname. Alternatively, endpoint identification for RMI TLS connections can be disabled on the client side by setting the jdk.rmi.ssl.client.enableEndpointIdentification system property to false.

 

Notable Issues Fixed

hotspot/gc
 -XX:+UseTransparentHugePages Again Enables Transparent Huge Pages for G1 (JDK-8366434)

G1, the default garbage collector, can again properly utilize Transparent Huge Pages (THP) on systems with the THP mode configured as madvise.

The issue preventing the option -XX:+UseTransparentHugePages from enabling THP has been resolved.

 

Other Notes

install/install
 Windows Installers to Return to Full Version Directory and Use of Junction (JDK-8310932 (not public))

For the JDK11+ LTS families, the JDK will install into a version-specific installation directory by default. The installation directory of 11+ will have a - before the version-specific string to keep consistency with the past 11+ conventions per family. A junction, also known as a symlink for Windows, will also be created in a "latest" directory. It will point to the latest version of that family. Here is a breakdown example of installation and junction locations 11+ families:

Version Installation Directory Junction Location
jdk25.0.2 C:\Program Files\Java\jdk-25.0.2 C:\Program Files\Java\latest\jdk-25
jdk17.0.18 C:\Program Files\Java\jdk-17.0.18 C:\Program Files\Java\latest\jdk-17
jdk11.0.30 C:\Program Files\Java\jdk-11.0.30 C:\Program Files\Java\latest\jdk-11

Each junction will always point to the latest JDK of the matching LTS family. The junction for each family will be removed when the last JDK of the matching LTS family is uninstalled.

install/install
 Make jcmd Command Available in the Headless JDK RPM (JDK-8359443 (not public))

jcmd command will be available in the headless JDK RPM instead of the headful JDK RPM.

It will be added to the java alternatives group instead of the javac alternatives group.

security-libs/java.security
 Filter Rules for URIs in the Authority Info Access Extension for Certificates (JDK-8368032 (not public))

A new system and security property, com.sun.security.allowedAIALocations, has been introduced. This property allows users the ability to define one or more filtering rules to be applied to URIs obtained from the authority info access extension on X.509 certificates. These filter rules are applied specifically to the CA issuers access method. Any CA issuers URIs in X.509 certificates are only followed when the com.sun.security.enableAIAcaIssuers system property is enabled and the filter allows the URI.

In order to set the rules, the user must set either the com.sun.security.allowedAIALocations security property or the system property by the same name. If the system property has a value, it will override the security property. By default the property is blank, which enacts a deny-all ruleset.

For either property, the value consists of a set of space-separated rules that take the form of a URI, with the following constraints:

  • The URI must be absolute and hierarchical.
  • The URI must only use one of the following schemes: http, https, ldap, or ftp (case-insensitive).
  • A hostname or address must be specified and must match (case-insensitive). No name resolution is performed on hostnames to match URIs with IP addresses.
  • The port number must match. Where a port number is omitted, the well-known port will be used in the comparison.
  • For hierarchical schemes (http[s], ftp):
    • A rule's normalized path portion of the URI is matched in a case-sensitive manner. If the final component does not end in a slash (/), it is considered to be a file path and must match the CA issuer URI path component. If the rule's path component ends in a slash, then it must match or be a prefix of the CA issuer URI path component. (for example, a filter path of /ab/cd/ will match a CA issuer path of /ab/cd/, /ab/cd/ef and /ab/cd/ef/ghi.).
    • Query strings and fragments will be ignored when matching CA issuer URIs.
  • For ldap URIs:
    • The base DN must be an exact match (case-insensitive).
    • Any query string in the rule, if specified, will be ignored.

For the properties, a single value of "any" (case-insensitive) will create an allow-all rule.

 

Bug Fixes

This release also contains fixes for security vulnerabilities described in the Oracle Critical Patch Update.

Issues fixed in 25.0.2:
# JBS Component/Subcomponent Summary
1JDK-8366208client-libs/2dUnexpected exception in sun.java2d.cmm.lcms.LCMSImageLayout
2JDK-8367384client-libs/2dThe ICC_Profile class may throw exceptions during serialization
3JDK-8361748client-libs/2dEnforce limits on the size of an XBM image
4JDK-8354646client-libs/java.awtjava.awt.TextField allows to identify the spaces in a password when double clicked at the starting and end of the text
5JDK-8358532client-libs/javax.swingJFileChooser in GTK L&F still displays HTML filename
6JDK-8349188client-libs/javax.swingLineBorder does not scale correctly
7JDK-8358813client-libs/javax.swingJPasswordField identifies spaces in password via delete shortcuts
8JDK-8370465client-libs/javax.swingRight to Left Orientation Issues with MenuItem Component
9JDK-8365086core-libs/java.netCookieStore.getURIs() and get(URI) should return an immutable List
10JDK-8357959core-libs/java.nio(bf) ByteBuffer.allocateDirect initialization can result in large TTSP spikes
11JDK-8369656core-libs/java.util.concurrentCalling CompletableFuture.join() could execute task in common pool
12JDK-8369184core-libs/java.util:i18nSimpleTimeZone equals() Returns True for Unequal Instances with Different hashCode Values
13JDK-8364296hotspot/compilerSet IntelJccErratumMitigation flag ergonomically
14JDK-8365265hotspot/compilerx86 short forward jump exceeds 8-bit offset in methodHandles_x86.cpp when using Intel APX
15JDK-8360867hotspot/compilerCTW: Disable inline cache verification
16JDK-8357396hotspot/compilerRefactor nmethod::make_not_entrant to use Enum instead of "const char*"
17JDK-8361180hotspot/compilerDisable CompiledDirectCall verification with -VerifyInlineCaches
18JDK-8365468hotspot/compilerEagerJVMCI should only apply to the CompilerBroker JVMCI runtime
19JDK-8367333hotspot/compilerC2: Vector math operation intrinsification failure
20JDK-8362530hotspot/compilerVM crash with -XX:+PrintTieredEvents when collecting AOT profiling
21JDK-8367780hotspot/compilerEnable UseAPX on Intel CPUs only when both APX_F and APX_NCI_NDD_NF cpuid features are present
22JDK-8361211hotspot/compilerC2: Final graph reshaping generates unencodeable klass constants
23JDK-8368071hotspot/compilerCompilation throughput regressed 2X-8X after JDK-8355003
24JDK-8370318hotspot/compilerAES-GCM vector intrinsic may read out of bounds (x86_64, AVX-512)
25JDK-8361892hotspot/compilerAArch64: Incorrect matching rule leading to improper oop instruction encoding
26JDK-8358751hotspot/compilerC2: Recursive inlining check for compiled lambda forms is broken
27JDK-8359104hotspot/gcgc/TestAlwaysPreTouchBehavior.java#<gcname> fails on Linux
28JDK-8350621hotspot/gcCode cache stops scheduling GC
29JDK-8367948hotspot/jfrJFR: MethodTrace threshold setting has no effect
30JDK-8364257hotspot/jfrJFR: User-defined events and settings with a one-letter name cannot be configured
31JDK-8364993hotspot/jfrJFR: Disable jdk.ModuleExport in default.jfc
32JDK-8364556hotspot/jfrJFR: Disable SymbolTableStatistics and StringTableStatistics in default.jfc
33JDK-8364190hotspot/jfrJFR: RemoteRecordingStream withers don't work
34JDK-8368670hotspot/jfrDeadlock in JFR on event register + class load
35JDK-8365165hotspot/runtimeZap C-heap memory at delete/free
36JDK-8359423hotspot/runtimeImprove error message in case of missing jsa shared archive
37JDK-8365823hotspot/runtimeRevert storing abstract and interface Klasses to non-class metaspace
38JDK-8356324hotspot/runtimeJVM crash (SIGSEGV at ClassListParser::resolve_indy_impl) during -Xshare:dump starting from 21.0.5
39JDK-8343218hotspot/runtimeAdd option to disable allocating interface and abstract classes in non-class metaspace
40JDK-8363928hotspot/runtimeSpecifying AOTCacheOutput with a blank path causes the JVM to crash
41JDK-8364198hotspot/runtimeNMT should have a better corruption message
42JDK-8364199hotspot/runtimeEnhance list of environment variables printed in hserr/hsinfo file
43JDK-8364235hotspot/runtimeFix for JDK-8361447 breaks the alignment requirements for GuardedMemory
44JDK-8369506hotspot/runtimeBytecode rewriting causes Java heap corruption on AArch64
45JDK-8369190hotspot/runtimeJavaFrameAnchor on AArch64 has unnecessary barriers and wrong store order in MacroAssembler
46JDK-8364660hotspot/runtimeClassVerifier::ends_in_athrow() should be removed
47JDK-8367689hotspot/svc-agentRevert removal of several compilation-related vmStructs fields
48JDK-8358723tools/jpackagejpackage signing issues: the main launcher doesn't have entitlements
49JDK-8371094tools/jpackage--mac-signing-key-user-name no longer works
50JDK-8365790tools/jpackageShutdown hook for application image does not work on Windows
51JDK-8372753tools/jpackagejpackage ignores --file-associations option with predefined app image