APAR status
Closed as program error.
Error description
Error Message: N/A . Stack Trace: N/A . The memory leak was observed with Java 8, SR7 FP16 or later. The problem did not occur when IBMJCEPlus was removed from the provider list.
Local fix
In JRE_HOME/lib/security/java.security file, place IBMJCE ahead of IBMJCEPlus in provider list
Problem summary
Computing DIffie-Hellman secret repeatedly, using IBMJCEPlus, cause a small memory leak. The memory leak occurs when internal data structure used during the computation of secret is not freed.
Problem conclusion
The JVM has been fixed not to leak memory during Diffie-Hellman secret computation. The associated Hursley RTC Problem Report is 148522 Austin GitHub issue: 500 JVMs affected: Java 8.0 The fix was delivered for Java 8 SR8 The build levels: 2022-12-12 The affected files: native libraries libjgskit.so, jgskit.dll . This APAR will be fixed in the following Releases: . IBM SDK, Java Technology Edition 8 SR8 (8.0.8.0) . Contact your IBM Product's Service Team for these Service Refreshes and Fix Packs. For those running stand-alone, information about the available maintenance can be found at: https://www.ibm.com/support/pages/java-sdk
Temporary fix
Comments
APAR Information
APAR number
IJ44621
Reported component name
SECURITY
Reported component ID
620700125
Reported release
270
Status
CLOSED PER
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt / Xsystem
Submitted date
2022-12-14
Closed date
2023-01-26
Last modified date
2023-01-26
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Fix information
Fixed component name
SECURITY
Fixed component ID
620700125
Applicable component levels
[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSNVBF","label":"Runtimes for Java Technology"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"270","Line of Business":{"code":"LOB36","label":"IBM Automation"}}]
Document Information
Modified date:
27 January 2023