Currently, we link against NSS on RHEL builds to obtain the SECMOD_GetSystemFIPSEnabled function. However, this is not possible on portable builds and creates an unnecessary difference between the two.
We can instead detect NSS using dlopen at runtime and only then fall back on the /proc method if that fails.
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory (java-17-openjdk bug fix and enhancement update), and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.