Open JDK build number for JDK 8 is displayed incorrectly in java -version output.
25.12.0.0
25.12.0.0
Release date: December 22, 2025
This PSU release is based on the Azul Zing Build of OpenJDK (Zing) 25.10.0.0 and corresponds to the following OpenJDK versions:
| Major Version | OpenJDK Version |
|---|---|
8 |
1.8.0_472-b8 |
11 |
11.0.29+7-LTS |
17 |
17.0.17+10-LTS |
21 |
21.0.9+10-LTS |
What’s New
-
Zing 25.12.0.0 includes an implementation of the JDK flag
-XX:LockingModein anticipation for JDK 25, which has also been backported to support Zing JDK 8, 11, 17 and 21.-XX:LockingModehas 2 options,1, which sets the locking mode to LEGACY, and2, which sets the locking mode to LIGHTWEIGHT. LEGACY locking mode is the default. -
October 2025 PSU release security fixes.
CVE fixes
| CVE # | Component | Protocol | Remote Exploit w/o Auth. | Base Score | Attack Vector | Attack Complex | Privileges Req’d | User Interact | Scope | Confiden-tiality | Integrity | Availability | Versions Affected | Notes |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
JAXP |
Multiple |
Yes |
7.5 |
Network |
Low |
None |
None |
Unchanged |
High |
None |
None |
21, 17, 11, 8 |
Note 2 |
|
Security |
Multiple |
Yes |
5.9 |
Network |
High |
None |
None |
Unchanged |
None |
High |
None |
21, 17, 11, 8 |
Note 2 |
|
Libraries |
Multiple |
Yes |
3.7 |
Network |
High |
None |
None |
Unchanged |
None |
Low |
None |
21 |
Note 2 |
|
CVE-2025-31257 This CVE is not applicable to Azul Zing Builds of OpenJDK. It is listed here for comparison with other Java implementations which may contain this CVE. |
JavaFX (WebKitGTK) |
Multiple |
Yes |
7.5 |
Network |
High |
None |
Required |
Unchanged |
High |
High |
High |
None |
Note 1 |
CVE-2025-61755 This CVE is not applicable to Azul Zing Builds of OpenJDK. It is listed here for comparison with other Java implementations which may contain this CVE. |
Compiler |
Multiple |
Yes |
3.7 |
Network |
High |
None |
None |
Unchanged |
Low |
None |
None |
None |
|
Notes:
| ID | Notes |
|---|---|
1 |
This vulnerability applies to Java deployments, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). |
2 |
This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. |
For more information about CVE and non-CVE security fixes in this release, refer to Common Vulnerabilities and Exposures Fixes for October 2025