[Bug 1283828] Re: "Cannot find any provider supporting RSA/ECB/OAEPPadding" error after upgrading to openjdk-6 6b27-1.12.6-1ubuntu0.12.04.4

Launchpad Bug Tracker 1283828 at bugs.launchpad.net
Thu Feb 27 20:48:45 UTC 2014


This bug was fixed in the package openjdk-6 -
6b30-1.13.1-1ubuntu2~0.12.04.1

---------------
openjdk-6 (6b30-1.13.1-1ubuntu2~0.12.04.1) precise-security; urgency=medium

  * Backport to Ubuntu 12.04 LTS

openjdk-6 (6b30-1.13.1-1ubuntu2) trusty; urgency=medium

  * pull out changes to configure and acinclude.m4 from diff.gz and
    conditionally apply to Debian and Ubuntu releases that have arm64 and/or
    automake-1.14. IcedTea 1.13 requires automake 1.14 now and the change to
    diff.gz caused a FTBFS on backport builds
    - add debian/patches/autotools-aarch64.diff
    - debian/rules:
      + add PRECONFIGURE_DEBIAN_PATCHES which is empty on releases where we
        don't have automake-1.14, otherwise add autotools-aarch64.diff
      + add preconfigure-distribution-patches.stamp target and have
        stamps/icedtea-configure depend on it
      + adjust debian-clean to unapply PRECONFIGURE_DEBIAN_PATCHES
  * debian/rules: disable system lcms2 for releases that don't have lcms2 2.5
    or higher
  * debian/patches/8017173.diff: XMLCipher with RSA_OAEP Key Transport
    algorithm can't be instantiated (LP: #1283828)
  * debian/patches/java-access-bridge-security.patch: fix malformed patch

openjdk-6 (6b30-1.13.1-1ubuntu1) trusty; urgency=medium

  * Regenerate the control file.

openjdk-6 (6b30-1.13.1-1) unstable; urgency=medium

  * IcedTea 1.13.1 release.
  * Security fixes
    - S6727821: Enhance JAAS Configuration.
    - S7068126, CVE-2014-0373: Enhance SNMP statuses.
    - S8010935: Better XML handling.
    - S8011786, CVE-2014-0368: Better applet networking.
    - S8021257, CVE-2013-5896: com.sun.corba.se.** should be on
      restricted package list.
    - S8021271: Better buffering in ObjC code.
    - S8022904: Enhance JDBC Parsers.
    - S8022927: Input validation for byte/endian conversions.
    - S8022935: Enhance Apache resolver classes.
    - S8022945: Enhance JNDI implementation classes.
    - S8023057: Enhance start up image display.
    - S8023069, CVE-2014-0411: Enhance TLS connections.
    - S8023245, CVE-2014-0423: Enhance Beans decoding.
    - S8023301: Enhance generic classes.
    - S8023672: Enhance jar file validation.
    - S8024306, CVE-2014-0416: Enhance Subject consistency.
    - S8024530: Enhance font process resilience.
    - S8024867: Enhance logging start up.
    - S8025014: Enhance Security Policy.
    - S8025018, CVE-2014-0376: Enhance JAX-P set up.
    - S8025026, CVE-2013-5878: Enhance canonicalization.
    - S8025034, CVE-2013-5907: Improve layout lookups.
    - S8025448: Enhance listening events.
    - S8025758, CVE-2014-0422: Enhance Naming management.
    - S8025767, CVE-2014-0428: Enhance IIOP Streams.
    - S8026172: Enhance UI Management.
    - S8026176: Enhance document printing.
    - S8026193, CVE-2013-5884: Enhance CORBA stub factories.
    - S8026204: Enhance auth login contexts.
    - S8026417, CVE-2013-5910: Enhance XML canonicalization.
    - S8027201, CVE-2014-0376: Enhance JAX-P set up.

openjdk-6 (6b29-1.13.0-2) unstable; urgency=medium

  * Fix the sparc builds.

openjdk-6 (6b29-1.13.0-1) unstable; urgency=medium

  * IcedTea 1.13.0 release.

openjdk-6 (6b27-1.12.7-2) unstable; urgency=low

  * Fix build failure on arm*.
  * Re-enable running the testsuite.
 -- Jamie Strandboge <jamie at ubuntu.com>   Tue, 25 Feb 2014 16:27:51 -0600

** Changed in: openjdk-6 (Ubuntu Precise)
       Status: In Progress => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-5878

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-5884

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-5896

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-5907

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-5910

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0368

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0373

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0376

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0411

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0416

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0422

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0423

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0428

** Changed in: openjdk-6 (Ubuntu Quantal)
       Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openjdk-6 in Ubuntu.
https://bugs.launchpad.net/bugs/1283828

Title:
  "Cannot find any  provider supporting RSA/ECB/OAEPPadding" error after
  upgrading to openjdk-6 6b27-1.12.6-1ubuntu0.12.04.4

Status in “openjdk-6” package in Ubuntu:
  Fix Released
Status in “openjdk-6” source package in Lucid:
  Fix Released
Status in “openjdk-6” source package in Precise:
  Fix Released
Status in “openjdk-6” source package in Quantal:
  Fix Released
Status in “openjdk-6” source package in Saucy:
  Fix Released
Status in “openjdk-6” source package in Trusty:
  Fix Released

Bug description:
  After upgrading the various openjdk-6-* packages to version 6b27-1.12.6-1ubuntu0.10.04.4 on our server, all incoming client connections started failing with the following error message at the top of the stack dump (on the client side).
  javax.xml.ws.soap.SOAPFaultException: java.security.NoSuchAlgorithmException: Cannot find any  provider supporting RSA/ECB/OAEPPadding

  (Previously we were running version 6b27-1.12.5-0ubuntu0.10.04.1 of
  the packages without seeing this problem.)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openjdk-6/+bug/1283828/+subscriptions



More information about the foundations-bugs mailing list