JDK-8161536 : sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java fails with ProviderException
  • Type: Bug
  • Component: security-libs
  • Sub-Component: javax.crypto:pkcs11
  • Affected Version: 9,10,11,13
  • Priority: P3
  • Status: Resolved
  • Resolution: Fixed
  • Submitted: 2016-07-16
  • Updated: 2024-03-07
  • Resolved: 2023-09-05
The Version table provides details related to the release that this issue/RFE will be addressed.

Unresolved : Release in which this issue/RFE will be addressed.
Resolved: Release in which this issue/RFE has been resolved.
Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.

To download the current JDK release, click here.
JDK 11 JDK 17 JDK 21 JDK 22
11.0.23-oracleFixed 17.0.10Fixed 21.0.2Fixed 22 b14Fixed
Related Reports
Relates :  
Relates :  
Sub Tasks
JDK-8225390 :  
Description
sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java failed in JDK9 111 same binaries run, one time only so far (out of the total 894 runs) with following exceptions:

javax.net.ssl.SSLException: java.security.ProviderException: Internal error: close session with active objects
	at sun.security.ssl.Alerts.getSSLException(java.base@9-ea/Alerts.java:214)
	at sun.security.ssl.SSLSocketImpl.fatal(java.base@9-ea/SSLSocketImpl.java:1948)
	at sun.security.ssl.SSLSocketImpl.fatal(java.base@9-ea/SSLSocketImpl.java:1900)
	at sun.security.ssl.SSLSocketImpl.handleException(java.base@9-ea/SSLSocketImpl.java:1883)
	at sun.security.ssl.SSLSocketImpl.handleException(java.base@9-ea/SSLSocketImpl.java:1809)
	at sun.security.ssl.AppInputStream.read(java.base@9-ea/AppInputStream.java:173)
	at sun.security.ssl.AppInputStream.read(java.base@9-ea/AppInputStream.java:84)
	at CipherTest$Server.handleRequest(CipherTest.java:79)
	at JSSEServer$1.run(JSSEServer.java:67)
	at java.util.concurrent.ThreadPoolExecutor.runWorker(java.base@9-ea/ThreadPoolExecutor.java:1158)
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(java.base@9-ea/ThreadPoolExecutor.java:632)
	at java.lang.Thread.run(java.base@9-ea/Thread.java:804)
Caused by: java.security.ProviderException: Internal error: close session with active objects
	at sun.security.pkcs11.Session.close(jdk.crypto.pkcs11@9-ea/Session.java:117)
	at sun.security.pkcs11.SessionManager.closeSession(jdk.crypto.pkcs11@9-ea/SessionManager.java:232)
	at sun.security.pkcs11.SessionManager.killSession(jdk.crypto.pkcs11@9-ea/SessionManager.java:174)
	at sun.security.pkcs11.Token.killSession(jdk.crypto.pkcs11@9-ea/Token.java:311)
	at sun.security.pkcs11.P11Digest.engineReset(jdk.crypto.pkcs11@9-ea/P11Digest.java:144)
	at sun.security.pkcs11.P11Digest.engineDigest(jdk.crypto.pkcs11@9-ea/P11Digest.java:194)
	at java.security.MessageDigest$Delegate.engineDigest(java.base@9-ea/MessageDigest.java:604)
	at java.security.MessageDigest.digest(java.base@9-ea/MessageDigest.java:399)
	at com.sun.crypto.provider.TlsPrfGenerator.expand(java.base@9-ea/TlsPrfGenerator.java:324)
	at com.sun.crypto.provider.TlsPrfGenerator.doTLS12PRF(java.base@9-ea/TlsPrfGenerator.java:210)
	at com.sun.crypto.provider.TlsPrfGenerator.doTLS12PRF(java.base@9-ea/TlsPrfGenerator.java:174)
	at com.sun.crypto.provider.TlsKeyMaterialGenerator.engineGenerateKey0(java.base@9-ea/TlsKeyMaterialGenerator.java:129)
	at com.sun.crypto.provider.TlsKeyMaterialGenerator.engineGenerateKey(java.base@9-ea/TlsKeyMaterialGenerator.java:90)
	at javax.crypto.KeyGenerator.generateKey(java.base@9-ea/KeyGenerator.java:553)
	at sun.security.ssl.Handshaker.calculateConnectionKeys(java.base@9-ea/Handshaker.java:1316)
	at sun.security.ssl.Handshaker.calculateKeys(java.base@9-ea/Handshaker.java:1148)
	at sun.security.ssl.ServerHandshaker.processMessage(java.base@9-ea/ServerHandshaker.java:310)
	at sun.security.ssl.Handshaker.processLoop(java.base@9-ea/Handshaker.java:1003)
	at sun.security.ssl.Handshaker.processRecord(java.base@9-ea/Handshaker.java:937)
	at sun.security.ssl.SSLSocketImpl.processInputRecord(java.base@9-ea/SSLSocketImpl.java:1118)
	at sun.security.ssl.SSLSocketImpl.readRecord(java.base@9-ea/SSLSocketImpl.java:1055)
	at sun.security.ssl.SSLSocketImpl.readRecord(java.base@9-ea/SSLSocketImpl.java:966)
	at sun.security.ssl.SSLSocketImpl.performInitialHandshake(java.base@9-ea/SSLSocketImpl.java:1381)
	at sun.security.ssl.SSLSocketImpl.bytesInCompletePacket(java.base@9-ea/SSLSocketImpl.java:900)
	at sun.security.ssl.AppInputStream.read(java.base@9-ea/AppInputStream.java:144)
	... 6 more
javax.net.ssl.SSLException: Received fatal alert: internal_error
	at sun.security.ssl.Alerts.getSSLException(java.base@9-ea/Alerts.java:214)
	at sun.security.ssl.Alerts.getSSLException(java.base@9-ea/Alerts.java:159)
	at sun.security.ssl.SSLSocketImpl.recvAlert(java.base@9-ea/SSLSocketImpl.java:2020)
	at sun.security.ssl.SSLSocketImpl.processInputRecord(java.base@9-ea/SSLSocketImpl.java:1188)
	at sun.security.ssl.SSLSocketImpl.readRecord(java.base@9-ea/SSLSocketImpl.java:1055)
	at sun.security.ssl.SSLSocketImpl.readRecord(java.base@9-ea/SSLSocketImpl.java:966)
	at sun.security.ssl.SSLSocketImpl.performInitialHandshake(java.base@9-ea/SSLSocketImpl.java:1381)
	at sun.security.ssl.SSLSocketImpl.writeRecord(java.base@9-ea/SSLSocketImpl.java:726)
	at sun.security.ssl.AppOutputStream.write(java.base@9-ea/AppOutputStream.java:67)
	at java.io.OutputStream.write(java.base@9-ea/OutputStream.java:75)
	at CipherTest$Client.sendRequest(CipherTest.java:381)
	at JSSEClient.runTest(JSSEClient.java:57)
	at CipherTest$Client.run(CipherTest.java:368)
	at java.lang.Thread.run(java.base@9-ea/Thread.java:804)
java.lang.Exception: *** Test 'Client JSSE - Server JSSE' failed ***
	at CipherTest.run(CipherTest.java:325)
	at CipherTest.main(CipherTest.java:449)
	at ClientJSSEServerJSSE.main(ClientJSSEServerJSSE.java:64)
	at PKCS11Test.premain(PKCS11Test.java:167)
	at PKCS11Test.testDefault(PKCS11Test.java:249)
	at PKCS11Test.main(PKCS11Test.java:197)
	at ClientJSSEServerJSSE.main(ClientJSSEServerJSSE.java:54)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(java.base@9-ea/Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(java.base@9-ea/NativeMethodAccessorImpl.java:62)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(java.base@9-ea/DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(java.base@9-ea/Method.java:531)
	at com.sun.javatest.regtest.agent.MainWrapper$MainThread.run(MainWrapper.java:110)
	at java.lang.Thread.run(java.base@9-ea/Thread.java:804)



Comments
Do not backport to Java 11 - This JIra is to add "-Djava.security.manager=allow" parameter to the test case - While this parameter does not work on Java 11, so we cannot add it in fact. - So we cannot back port it to 11
26-02-2024

A pull request was submitted for review. URL: https://git.openjdk.org/jdk11u-dev/pull/2521 Date: 2024-02-08 22:40:26 +0000
08-02-2024

Fix request [17u] I backport this for parity with 17.0.11-oracle. No risk, only a test change. Resolved ProblemList, probably recognized clean. Test passes. SAP nightly testing passed.
06-11-2023

A pull request was submitted for review. URL: https://git.openjdk.org/jdk17u-dev/pull/1944 Date: 2023-11-02 16:26:51 +0000
02-11-2023

Fix request [21u] I backport this for parity with 17.0.11-oracle. 21 should not fall back. No risk, only a test change. Clean backport. Test passes. SAP nightly testing passed.
01-11-2023

A pull request was submitted for review. URL: https://git.openjdk.org/jdk21u/pull/309 Date: 2023-10-31 12:09:48 +0000
31-10-2023

Changeset: 939d7c5d Author: Rajan Halade <rhalade@openjdk.org> Date: 2023-09-05 17:51:12 +0000 URL: https://git.openjdk.org/jdk/commit/939d7c5d8466f9e392beae2947a494ac28695cc1
05-09-2023

A pull request was submitted for review. URL: https://git.openjdk.org/jdk/pull/15497 Date: 2023-08-30 20:45:06 +0000
30-08-2023

When looking at stacktrace, I believe this issue has already been fixed by JDK-8240256 [1]. Check for live objects in Session.close [2] method became conditional. SessionManager.killSession [3] now calls Session.kill [4], which in turn calls Session.close [2] with check for live objects disabled. So this exception should no longer happen. [1] https://bugs.openjdk.org/browse/JDK-8240256 [2] https://github.com/openjdk/jdk/blob/211fab8d361822bbd1a34a88626853bf4a029af5/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/Session.java#L125 [3] https://github.com/openjdk/jdk/blob/211fab8d361822bbd1a34a88626853bf4a029af5/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SessionManager.java#L163 [4] https://github.com/openjdk/jdk/blob/211fab8d361822bbd1a34a88626853bf4a029af5/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/Session.java#L121
14-09-2022

This issue hasn't been linked since October 30th. Removing maintainer-pain label.
09-01-2020

Because the keystore contains MD5withRSA certificates, this test ignored all cases on TLSv1.3. In fact, this keystore also contains SHA1withRSA and SHA1WithECDSA certificates, which can be accepted by TLSv1.3. But the client auth on DSA is not supported by the newest TLS version, so such cases should be ignored.
22-07-2019

The main problem is the issue cannot be easily reproduced. I would update this test to output more information for further investigation.
18-07-2019

Test has been problem listed in JDK-8225390 Fixing of this (JDK-8161536) bug, please remember to get the test back.
14-06-2019

The attached test, which contains Server.java, Client.java and Utils.java, raises the position of SunPKCS11-NSS provider to No.1 and makes TLS connections between 1 server and 100 clients. But it doesn't reproduce this issue.
10-04-2019

Interestingly, the default SunPKCS11 provider isn't touched in fact. 269 if (p.getName().startsWith("SunPKCS11-")) { The name of this provider just be SunPKCS11, but no extra dash. In addition, no file /opt/SUNWconn/lib/libpkcs11.so in the testing machines, so Deimos also isn't tested. That means PKCS11 tests may only check SunPKCS11-NSS provider.
10-04-2019

The codes in this test may not be quite fine, but javax/net/ssl/sanity/interop/ClientJSSEServerJSSE.java has very similar codes, and it doesn't raise a similar issue. The main difference between these two tests should be the providers. sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java uses SunPKCS11, however javax/net/ssl/sanity/interop/ClientJSSEServerJSSE.java uses SunJSSE. In fact, the error is thrown by sun.security.pkcs11 classes.
01-04-2019

A possible tricky solution just be not running the cases in concurrency.
28-03-2019

Reproduced this issue by running this test in a loop. 1. ** Failed SSL_RSA_WITH_NULL_SHA in SSLv3 mode with ECDSA client authentication** javax.net.ssl.SSLException: Internal error: close session with active objects at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:320) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:263) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:258) at java.base/sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1342) at java.base/sun.security.ssl.SSLSocketImpl$AppInputStream.read(SSLSocketImpl.java:844) at java.base/sun.security.ssl.SSLSocketImpl$AppInputStream.read(SSLSocketImpl.java:763) at CipherTest$Client.sendRequest(CipherTest.java:273) at JSSEClient.runTest(JSSEClient.java:74) at CipherTest$Client.run(CipherTest.java:252) at java.base/java.lang.Thread.run(Thread.java:835) Caused by: java.security.ProviderException: Internal error: close session with active objects at jdk.crypto.cryptoki/sun.security.pkcs11.Session.close(Session.java:117) at jdk.crypto.cryptoki/sun.security.pkcs11.SessionManager.closeSession(SessionManager.java:232) at jdk.crypto.cryptoki/sun.security.pkcs11.SessionManager$Pool.release(SessionManager.java:264) at jdk.crypto.cryptoki/sun.security.pkcs11.SessionManager.demoteObjSession(SessionManager.java:205) at jdk.crypto.cryptoki/sun.security.pkcs11.Session.removeObject(Session.java:105) at jdk.crypto.cryptoki/sun.security.pkcs11.SessionKeyRef.dispose(P11Key.java:1342) at jdk.crypto.cryptoki/sun.security.pkcs11.NativeKeyHolder.releaseKeyID(P11Key.java:1271) at jdk.crypto.cryptoki/sun.security.pkcs11.P11Key.releaseKeyID(P11Key.java:153) at jdk.crypto.cryptoki/sun.security.pkcs11.P11Mac.reset(P11Mac.java:133) at jdk.crypto.cryptoki/sun.security.pkcs11.P11Mac.engineDoFinal(P11Mac.java:213) at java.base/javax.crypto.Mac.doFinal(Mac.java:581) at java.base/sun.security.ssl.Authenticator$MacImpl.compute(Authenticator.java:514) at java.base/sun.security.ssl.Authenticator$SSL30Mac.compute(Authenticator.java:558) at java.base/sun.security.ssl.SSLCipher.checkMacTags(SSLCipher.java:2761) at java.base/sun.security.ssl.SSLCipher.checkStreamMac(SSLCipher.java:2691) at java.base/sun.security.ssl.SSLCipher$NullReadCipherGenerator$NullReadCipher.decrypt(SSLCipher.java:754) at java.base/sun.security.ssl.SSLSocketInputRecord.decodeInputRecord(SSLSocketInputRecord.java:262) at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:190) at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:108) at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1183) at java.base/sun.security.ssl.SSLSocketImpl.readApplicationRecord(SSLSocketImpl.java:1153) at java.base/sun.security.ssl.SSLSocketImpl$AppInputStream.read(SSLSocketImpl.java:828) ... 5 more java.lang.Exception: *** Test 'Client JSSE - Server JSSE' failed *** at CipherTest.run(CipherTest.java:209) at CipherTest.main(CipherTest.java:337) at ClientJSSEServerJSSE.main(ClientJSSEServerJSSE.java:67) at PKCS11Test.premain(PKCS11Test.java:183) at PKCS11Test.testNSS(PKCS11Test.java:577) at PKCS11Test.main(PKCS11Test.java:219) at ClientJSSEServerJSSE.main(ClientJSSEServerJSSE.java:57) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.base/java.lang.reflect.Method.invoke(Method.java:567) at com.sun.javatest.regtest.agent.MainWrapper$MainThread.run(MainWrapper.java:127) at java.base/java.lang.Thread.run(Thread.java:835) 2. ** Failed TLS_ECDH_anon_WITH_NULL_SHA in TLSv1.1 mode** javax.net.ssl.SSLException: Received fatal alert: internal_error at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133) at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:307) at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:285) at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:180) at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:164) at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1183) at java.base/sun.security.ssl.SSLSocketImpl.readApplicationRecord(SSLSocketImpl.java:1153) at java.base/sun.security.ssl.SSLSocketImpl$AppInputStream.read(SSLSocketImpl.java:828) at java.base/sun.security.ssl.SSLSocketImpl$AppInputStream.read(SSLSocketImpl.java:763) at CipherTest$Server.handleRequest(CipherTest.java:80) at JSSEServer$1.run(JSSEServer.java:83) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at java.base/java.lang.Thread.run(Thread.java:835) javax.net.ssl.SSLException: Internal error: close session with active objects at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:320) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:263) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:258) at java.base/sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1342) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:408) at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:721) at java.base/sun.security.ssl.SSLSocketImpl$AppOutputStream.write(SSLSocketImpl.java:998) at java.base/java.io.OutputStream.write(OutputStream.java:122) at CipherTest$Client.sendRequest(CipherTest.java:269) at JSSEClient.runTest(JSSEClient.java:74) at CipherTest$Client.run(CipherTest.java:252) at java.base/java.lang.Thread.run(Thread.java:835) Caused by: java.security.ProviderException: Internal error: close session with active objects at jdk.crypto.cryptoki/sun.security.pkcs11.Session.close(Session.java:117) at jdk.crypto.cryptoki/sun.security.pkcs11.SessionManager.closeSession(SessionManager.java:232) at jdk.crypto.cryptoki/sun.security.pkcs11.SessionManager$Pool.release(SessionManager.java:264) at jdk.crypto.cryptoki/sun.security.pkcs11.SessionManager.demoteObjSession(SessionManager.java:205) at jdk.crypto.cryptoki/sun.security.pkcs11.Session.removeObject(Session.java:105) at jdk.crypto.cryptoki/sun.security.pkcs11.SessionKeyRef.dispose(P11Key.java:1342) at jdk.crypto.cryptoki/sun.security.pkcs11.NativeKeyHolder.releaseKeyID(P11Key.java:1271) at jdk.crypto.cryptoki/sun.security.pkcs11.P11Key.releaseKeyID(P11Key.java:153) at jdk.crypto.cryptoki/sun.security.pkcs11.P11Mac.reset(P11Mac.java:133) at jdk.crypto.cryptoki/sun.security.pkcs11.P11Mac.engineDoFinal(P11Mac.java:213) at java.base/javax.crypto.Mac.doFinal(Mac.java:581) at java.base/sun.security.ssl.Authenticator$MacImpl.compute(Authenticator.java:514) at java.base/sun.security.ssl.Authenticator$TLS10Mac.compute(Authenticator.java:581) at java.base/sun.security.ssl.SSLCipher.checkMacTags(SSLCipher.java:2761) at java.base/sun.security.ssl.SSLCipher.checkStreamMac(SSLCipher.java:2691) at java.base/sun.security.ssl.SSLCipher$NullReadCipherGenerator$NullReadCipher.decrypt(SSLCipher.java:754) at java.base/sun.security.ssl.SSLSocketInputRecord.decodeInputRecord(SSLSocketInputRecord.java:262) at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:190) at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:108) at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1180) at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1091) at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:402) ... 7 more java.lang.Exception: *** Test 'Client JSSE - Server JSSE' failed *** at CipherTest.run(CipherTest.java:209) at CipherTest.main(CipherTest.java:337) at ClientJSSEServerJSSE.main(ClientJSSEServerJSSE.java:67) at PKCS11Test.premain(PKCS11Test.java:183) at PKCS11Test.testNSS(PKCS11Test.java:577) at PKCS11Test.main(PKCS11Test.java:219) at ClientJSSEServerJSSE.main(ClientJSSEServerJSSE.java:57) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.base/java.lang.reflect.Method.invoke(Method.java:567) at com.sun.javatest.regtest.agent.MainWrapper$MainThread.run(MainWrapper.java:127) at java.base/java.lang.Thread.run(Thread.java:835)
26-03-2019

CI failures seems to quite infrequent. The test history shows only 4 this year: 1 sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java Mar 25th 2019, 6:30:44 pm JDK-8161536 31s x64 Exception:... bug6405536... -Djdk.tls.namedGroups... mach5-one-jdk13-jdk-6... mach5-one-jdk13-jdk-6... linked to JDK-8161536 2 sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java Mar 12th 2019, 6:16:59 pm JDK-8161536 38s Sparc Exception:... bug6405536... -Djdk.tls.namedGroups... mach5-one-jdk13-jdk-5... mach5-one-jdk13-jdk-5... linked to JDK-8161536 3 sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java Mar 1st 2019, 10:57:29 pm JDK-8161536 13s x64 Exception:... bug6405536... -Djdk.tls.namedGroups... mach5-one-jdk13-jdk-5... mach5-one-jdk13-jdk-5... linked to JDK-8161536 4 sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java Feb 21st 2019, 6:45:50 pm JDK-8161536 28s x64 Exception:... bug6405536... -Djdk.tls.namedGroups... mach5-one-jdk13-jdk-4... mach5-one-jdk13-jdk-4... linked to JDK-8161536 Probably worth bumping priority to get this fixed or else move it out of tier2.
25-03-2019