openjdk team mailing list archive
-
openjdk team
-
Mailing list archive
-
Message #10112
[Bug 1283828] Re: "Cannot find any provider supporting RSA/ECB/OAEPPadding" error after upgrading to openjdk-6 6b27-1.12.6-1ubuntu0.12.04.4
This bug was fixed in the package openjdk-7 -
7u55-2.4.7-1ubuntu1~0.13.10.1
---------------
openjdk-7 (7u55-2.4.7-1ubuntu1~0.13.10.1) saucy-security; urgency=medium
* Backport for Ubuntu 13.10 (LP: #1283828)
openjdk-7 (7u55-2.4.7-1ubuntu1) trusty-security; urgency=medium
* Regenerate the control file.
openjdk-7 (7u55-2.4.7-1) unstable; urgency=high
* IcedTea7 2.4.7 release.
* Security fixes
- S8023046: Enhance splashscreen support.
- S8025005: Enhance CORBA initializations.
- S8025010, CVE-2014-2412: Enhance AWT contexts.
- S8025030, CVE-2014-2414: Enhance stream handling.
- S8025152, CVE-2014-0458: Enhance activation set up.
- S8026067: Enhance signed jar verification.
- S8026163, CVE-2014-2427: Enhance media provisioning.
- S8026188, CVE-2014-2423: Enhance envelope factory.
- S8026200: Enhance RowSet Factory.
- S8026716, CVE-2014-2402: (aio) Enhance asynchronous channel handling.
- S8026736, CVE-2014-2398: Enhance Javadoc pages.
- S8026797, CVE-2014-0451: Enhance data transfers.
- S8026801, CVE-2014-0452: Enhance endpoint addressing.
- S8027766, CVE-2014-0453: Enhance RSA processing.
- S8027775: Enhance ICU code.
- S8027841, CVE-2014-0429: Enhance pixel manipulations.
- S8028385: Enhance RowSet Factory.
- S8029282, CVE-2014-2403: Enhance CharInfo set up.
- S8029286: Enhance subject delegation.
- S8029699: Update Poller demo.
- S8029730: Improve audio device additions.
- S8029735: Enhance service mgmt natives.
- S8029740, CVE-2014-0446: Enhance handling of loggers.
- S8029745, CVE-2014-0454: Enhance algorithm checking.
- S8029750: Enhance LCMS color processing (LCMS 2 only).
- S8029760, CVE-2013-6629: Enhance AWT image libraries (in-tree libjpeg).
- S8029844, CVE-2014-0455: Enhance argument validation.
- S8029854, CVE-2014-2421: Enhance JPEG decodings.
- S8029858, CVE-2014-0456: Enhance array copies.
- S8030731, CVE-2014-0460: Improve name service robustness.
- S8031330: Refactor ObjectFactory.
- S8031335, CVE-2014-0459: Better color profiling.
- S8031352, CVE-2013-6954: Enhance PNG handling (in-tree libpng).
- S8031394, CVE-2014-0457: (sl) Fix exception handling in ServiceLoader.
- S8031395: Enhance LDAP processing.
- S8032686, CVE-2014-2413: Issues with method invoke.
- S8033618, CVE-2014-1876: Correct logging output.
- S8034926, CVE-2014-2397: Attribute classes properly.
- S8036794, CVE-2014-0461: Manage JavaScript instances.
* AArch64 fixes.
openjdk-7 (7u51-2.4.6-1ubuntu4) trusty; urgency=medium
* AArch64 hotspot fixes (Ed Nevill):
- Use gcc __clear_cache instead of doing it ourselves.
- Preserve callee save FP registers around call to java code.
openjdk-7 (7u51-2.4.6-1ubuntu3) trusty; urgency=medium
* Don't search ecj.jar when it is not required for the build.
openjdk-7 (7u51-2.4.6-1ubuntu2) trusty; urgency=medium
* Fix the AArch64 build.
* Regenerate the control file.
openjdk-7 (7u51-2.4.6-1) unstable; urgency=medium
* IcedTea7 2.4.6 release.
* Explicitly use AC_MAINTAINER_MODE and automake-1.11 to create the
debian .orig tarball. Addresses: #740289.
* Apply patch from upstream to fix bold fonts in Swing applications using
GTK L&F (Ryan Tandy). LP: #937200.
* Explicitly build-depend on libkrb5-dev.
* On AArch64 don't use the hotsport backport for the zero build.
openjdk-7 (7u51-2.4.6~pre1-1) unstable; urgency=medium
* IcedTea7 2.4.6 prerelease.
* Fix icedtea-web build failure on kfreebsd-* (unable to find
sun.security.util.SecurityConstants). Steven Chamberlain. Closes: #739032.
* Update the AArch64 Hotspot.
openjdk-7 (7u51-2.4.5-2) unstable; urgency=medium
* Update the KFreeBSD patch (Steven Chamberlain). Closes: #736291.
openjdk-7 (7u51-2.4.5-1) unstable; urgency=medium
* IcedTea7 2.4.5 release.
* Build Hotspot client and server vms for AArch64.
-- Jamie Strandboge <jamie@xxxxxxxxxx> Thu, 17 Apr 2014 14:40:32 -0500
** Changed in: openjdk-7 (Ubuntu Saucy)
Status: In Progress => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-6629
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-6954
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0429
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0446
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0451
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0452
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0453
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0454
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0455
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0456
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0457
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0458
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0459
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0460
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0461
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1876
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2397
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2398
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2402
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2403
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2412
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2413
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2414
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2421
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2423
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2427
** Changed in: openjdk-7 (Ubuntu Quantal)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of OpenJDK,
which is subscribed to openjdk-7 in Ubuntu.
https://bugs.launchpad.net/bugs/1283828
Title:
"Cannot find any provider supporting RSA/ECB/OAEPPadding" error after
upgrading to openjdk-6 6b27-1.12.6-1ubuntu0.12.04.4
Status in Iced Tea:
Confirmed
Status in “openjdk-6” package in Ubuntu:
Fix Released
Status in “openjdk-7” package in Ubuntu:
Fix Released
Status in “openjdk-6” source package in Lucid:
Fix Released
Status in “openjdk-6” source package in Precise:
Fix Released
Status in “openjdk-7” source package in Precise:
Fix Released
Status in “openjdk-6” source package in Quantal:
Fix Released
Status in “openjdk-7” source package in Quantal:
Fix Released
Status in “openjdk-6” source package in Saucy:
Fix Released
Status in “openjdk-7” source package in Saucy:
Fix Released
Status in “openjdk-6” source package in Trusty:
Fix Released
Status in “openjdk-7” source package in Trusty:
Fix Released
Bug description:
After upgrading the various openjdk-6-* packages to version 6b27-1.12.6-1ubuntu0.10.04.4 on our server, all incoming client connections started failing with the following error message at the top of the stack dump (on the client side).
javax.xml.ws.soap.SOAPFaultException: java.security.NoSuchAlgorithmException: Cannot find any provider supporting RSA/ECB/OAEPPadding
(Previously we were running version 6b27-1.12.5-0ubuntu0.10.04.1 of
the packages without seeing this problem.)
To manage notifications about this bug go to:
https://bugs.launchpad.net/icedtea/+bug/1283828/+subscriptions
References