IBM Support

IV98628: NULLPOINTEREXCEPTION PERFORMING SSL HANDSHAKE USING CHROME BROWSER

Subscribe to this APAR

By subscribing, you receive periodic emails alerting you to the status of the APAR, along with a link to the fix after it becomes available. You can track this item individually or track all items by product.

Notify me when this APAR changes.

Notify me when an APAR for this component changes.

 

APAR status

  • Closed as program error.

Error description

  • Error Message: A SSLException is thrown due to a
    NullPointerException when performing a SSL handshake using a
    Chrome browser
    .
    Stack Trace: javax.net.ssl.SSLException:
    java.lang.NullPointerException
        at com.ibm.jsse2.k.a(k.java:21)
        at com.ibm.jsse2.rc.a(rc.java:19)
        at com.ibm.jsse2.rc.a(rc.java:598)
        at com.ibm.jsse2.rc.a(rc.java:554)
        at com.ibm.jsse2.rc.a(rc.java:178)
        at com.ibm.jsse2.i.write(i.java:25)
        at java.io.OutputStream.write(OutputStream.java:87)
        at sslsever.main(sslsever.java:66)
    Caused by: java.lang.NullPointerException
        at com.ibm.jsse2.ib.e(ib.java:149)
        at com.ibm.jsse2.p.<init>(p.java:21)
        at com.ibm.jsse2.db.C(db.java:624)
        at com.ibm.jsse2.db.a(db.java:425)
        at com.ibm.jsse2.db.b(db.java:319)
        at com.ibm.jsse2.db.a(db.java:689)
        at com.ibm.jsse2.db.a(db.java:421)
        at com.ibm.jsse2.bb.t(bb.java:537)
        at com.ibm.jsse2.bb.a(bb.java:530)
        at com.ibm.jsse2.rc.a(rc.java:797)
        at com.ibm.jsse2.rc.h(rc.java:710)
        at com.ibm.jsse2.rc.a(rc.java:689)
        at com.ibm.jsse2.i.write(i.java:8)
        ... 2 more
    .
    

Local fix

  • Disable elliptic curve cipher suites
    

Problem summary

  • The problem is caused when performing a SSL handshake using a
    Chrome browser
    

Problem conclusion

  • A change is made to the IBMJSSE2 provider
    The associated Hursley RTC Problem Report is 133821
    The associated Austin CMVC defect is 117686
    The associated Austin APAR is IV98349
    JVMs affected: Java 6.0, Java 626, Java 7.0, Java 727 and Java
    8.0
    The fix was delivered for Java 6.0 SR16FP55, Java 626 SR8FP55,
    Java 7.0 SR10FP15, Java 727 SR4FP15, and Java 8 SR5
    The affected jar is "ibmjsseprovider2.jar".
    The build level of this jar for the affected releases is
    "20170728"
    .
    This APAR will be fixed in the following Java Releases:
       7 R1 SR4 FP15  (7.1.4.15)
       6 R1 SR8 FP55  (6.1.8.55)
       8    SR5       (8.0.5.0)
       6    SR16 FP55 (6.0.16.55)
       7    SR10 FP15 (7.0.10.15)
    .
    Contact your IBM Product's Service Team for these Service
    Refreshes and Fix Packs.
    For those running stand-alone, information about the available
    Service Refreshes and Fix Packs can be found at:
               https://www.ibm.com/developerworks/java/jdk/
    

Temporary fix

Comments

APAR Information

  • APAR number

    IV98628

  • Reported component name

    SECURITY

  • Reported component ID

    620700125

  • Reported release

    260

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2017-07-31

  • Closed date

    2017-08-02

  • Last modified date

    2017-08-02

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    SECURITY

  • Fixed component ID

    620700125

Applicable component levels

  • R260 PSY

       UP

  • R270 PSY

       UP

  • R600 PSY

       UP

[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSNVBF","label":"Runtimes for Java Technology"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"260","Edition":"","Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
07 December 2020