This bug was fixed in the package openjdk-6 - 6b30-1.13.1-1ubuntu2~0.12.04.1
--------------- openjdk-6 (6b30-1.13.1-1ubuntu2~0.12.04.1) precise-security; urgency=medium * Backport to Ubuntu 12.04 LTS openjdk-6 (6b30-1.13.1-1ubuntu2) trusty; urgency=medium * pull out changes to configure and acinclude.m4 from diff.gz and conditionally apply to Debian and Ubuntu releases that have arm64 and/or automake-1.14. IcedTea 1.13 requires automake 1.14 now and the change to diff.gz caused a FTBFS on backport builds - add debian/patches/autotools-aarch64.diff - debian/rules: + add PRECONFIGURE_DEBIAN_PATCHES which is empty on releases where we don't have automake-1.14, otherwise add autotools-aarch64.diff + add preconfigure-distribution-patches.stamp target and have stamps/icedtea-configure depend on it + adjust debian-clean to unapply PRECONFIGURE_DEBIAN_PATCHES * debian/rules: disable system lcms2 for releases that don't have lcms2 2.5 or higher * debian/patches/8017173.diff: XMLCipher with RSA_OAEP Key Transport algorithm can't be instantiated (LP: #1283828) * debian/patches/java-access-bridge-security.patch: fix malformed patch openjdk-6 (6b30-1.13.1-1ubuntu1) trusty; urgency=medium * Regenerate the control file. openjdk-6 (6b30-1.13.1-1) unstable; urgency=medium * IcedTea 1.13.1 release. * Security fixes - S6727821: Enhance JAAS Configuration. - S7068126, CVE-2014-0373: Enhance SNMP statuses. - S8010935: Better XML handling. - S8011786, CVE-2014-0368: Better applet networking. - S8021257, CVE-2013-5896: com.sun.corba.se.** should be on restricted package list. - S8021271: Better buffering in ObjC code. - S8022904: Enhance JDBC Parsers. - S8022927: Input validation for byte/endian conversions. - S8022935: Enhance Apache resolver classes. - S8022945: Enhance JNDI implementation classes. - S8023057: Enhance start up image display. - S8023069, CVE-2014-0411: Enhance TLS connections. - S8023245, CVE-2014-0423: Enhance Beans decoding. - S8023301: Enhance generic classes. - S8023672: Enhance jar file validation. - S8024306, CVE-2014-0416: Enhance Subject consistency. - S8024530: Enhance font process resilience. - S8024867: Enhance logging start up. - S8025014: Enhance Security Policy. - S8025018, CVE-2014-0376: Enhance JAX-P set up. - S8025026, CVE-2013-5878: Enhance canonicalization. - S8025034, CVE-2013-5907: Improve layout lookups. - S8025448: Enhance listening events. - S8025758, CVE-2014-0422: Enhance Naming management. - S8025767, CVE-2014-0428: Enhance IIOP Streams. - S8026172: Enhance UI Management. - S8026176: Enhance document printing. - S8026193, CVE-2013-5884: Enhance CORBA stub factories. - S8026204: Enhance auth login contexts. - S8026417, CVE-2013-5910: Enhance XML canonicalization. - S8027201, CVE-2014-0376: Enhance JAX-P set up. openjdk-6 (6b29-1.13.0-2) unstable; urgency=medium * Fix the sparc builds. openjdk-6 (6b29-1.13.0-1) unstable; urgency=medium * IcedTea 1.13.0 release. openjdk-6 (6b27-1.12.7-2) unstable; urgency=low * Fix build failure on arm*. * Re-enable running the testsuite. -- Jamie Strandboge <ja...@ubuntu.com> Tue, 25 Feb 2014 16:27:51 -0600 ** Changed in: openjdk-6 (Ubuntu Precise) Status: In Progress => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-5878 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-5884 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-5896 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-5907 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-5910 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0368 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0373 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0376 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0411 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0416 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0422 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0423 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0428 ** Changed in: openjdk-6 (Ubuntu Quantal) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1283828 Title: "Cannot find any provider supporting RSA/ECB/OAEPPadding" error after upgrading to openjdk-6 6b27-1.12.6-1ubuntu0.12.04.4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openjdk-6/+bug/1283828/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs