IBM Support

IJ44040: GENERATING DIFFIE-HELLMAN KEY PAIRS REPEATEDLY, USING IBMJCEPLUS, CAUSES A SMALL MEMORY LEAK

Subscribe to this APAR

By subscribing, you receive periodic emails alerting you to the status of the APAR, along with a link to the fix after it becomes available. You can track this item individually or track all items by product.

Notify me when this APAR changes.

Notify me when an APAR for this component changes.

 

APAR status

  • Closed as program error.

Error description

  • Error Message: N/A
    .
    Stack Trace: N/A
    .
    The memory leak was observed with Java 8, SR7 FP5.  The problem
    did not occur when IBMJCEPlus was removed from the provider
    list.
    

Local fix

  • In JRE_HOME/lib/security/java.security file, place IBMJCE ahead
    of IBMJCEPlus in provider list,
    

Problem summary

  • Generating DIffie-Hellman KeyPairs repeatedly, using IBMJCEPlus,
    causes a small memory leak.
    
    The small memory leak occurs when internal data structure used
    during the generation of keypair is not freed.
    

Problem conclusion

  • The JVM has been fixed not to leak memory during Diffie-Hellman
    Key Pair generation.
    
    
    The associated Hursley RTC Problem Report is 148109
    
    Austin GitHub issue:  469
    
    JVMs affected: Java 8.0
    
    The fix was delivered for Java 8 SR8 FP0
    
    The build levels:  20221026
    
    The affected files: native libraries libjgskit.so, jgskit.dll
    
    .
    This APAR will be fixed in the following Releases:
    .
    IBM SDK, Java Technology Edition
       8    SR8 FP0  (8.0.8.0)
    .
    Contact your IBM Product's Service Team for these Service
    Refreshes and Fix Packs.
    For those running stand-alone, information about the available
    maintenance can be found at:
               https://www.ibm.com/support/pages/java-sdk
    

Temporary fix

Comments

APAR Information

  • APAR number

    IJ44040

  • Reported component name

    SECURITY

  • Reported component ID

    620700125

  • Reported release

    270

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2022-10-27

  • Closed date

    2022-10-29

  • Last modified date

    2022-12-08

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    SECURITY

  • Fixed component ID

    620700125

Applicable component levels

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSNVBF","label":"Runtimes for Java Technology"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"270","Line of Business":{"code":"LOB36","label":"IBM Automation"}}]

Document Information

Modified date:
08 December 2022