Bug 2188023
| Summary: | Backport JDK-8271199 [rhel-9.2.0.z] | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | RHEL Program Management Team <pgm-rhel-tools> |
| Component: | java-1.8.0-openjdk | Assignee: | Andrew John Hughes <ahughes> |
| Status: | CLOSED ERRATA | QA Contact: | OpenJDK QA <java-qa> |
| Severity: | unspecified | Docs Contact: | Jacob Taylor Valdez <jvaldez> |
| Priority: | unspecified | ||
| Version: | unspecified | CC: | ahughes, fferrari, gfialova, jandrlik, jvanek, mbalao, pmikova, sgehwolf |
| Target Milestone: | rc | Keywords: | Triaged, ZStream |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | java-1.8.0-openjdk-1.8.0.372.b07-2.el9 | Doc Type: | Bug Fix |
| Doc Text: |
.OpenJDK RSAPSSSignature implementation now validates RSA keys before using them
Previously, the RSAPSSSignature implementation in OpenJDK did not fully check if given RSA keys could be used by the SunRSASign provider before attempting to use them, which would result in errors when using custom security providers. The bug is now fixed and, as a result, the RSAPSSSignature implementation now validates RSA keys and allows other providers to handle these keys when it cannot.
|
Story Points: | --- |
| Clone Of: | 2175317 | Environment: | |
| Last Closed: | 2023-05-09 11:05:36 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2175317 | ||
| Bug Blocks: | |||
|
Comment 8
errata-xmlrpc
2023-05-09 11:05:36 UTC
|