- 
    Type:
Bug
 - 
    Resolution: Fixed
 - 
    Priority:
  P3                     
     - 
    Affects Version/s: 11, repo-phoenix
 - 
    Component/s: security-libs
 
- 
        b01
 - 
        solaris_11
 
| Issue | Fix Version | Assignee | Priority | Status | Resolution | Resolved In Build | 
|---|---|---|---|---|---|---|
| JDK-8263828 | 11.0.11-oracle | Dukebot | P3 | Resolved | Fixed | b09 | 
| JDK-8263500 | 8u301 | Prajwal Kumaraswamy | P3 | Resolved | Fixed | b01 | 
| JDK-8262850 | 8u291 | Prajwal Kumaraswamy | P4 | Resolved | Fixed | b09 | 
| JDK-8264250 | emb-8u291 | Prajwal Kumaraswamy | P3 | Resolved | Fixed | team | 
                    Currently OracleUcrypto Provider calls NativeCipher.nativeFinal(id, encrypt, null, 0); to free up context memory at native level. That leads to a ucryptoEncryptFinal type solaris call with NULL/0 passed for output Len. 
Solaris team have advised that ucrypto_free_context function be used instead. We'd have to investigate when this call became available on solaris.
Solaris team have advised that ucrypto_free_context function be used instead. We'd have to investigate when this call became available on solaris.
- backported by
 - 
                    
JDK-8263500 Use ucrypto_free_context for clean operation in Solaris Ucrypto/pkcs11
-         
     - Resolved
 
 -         
 - 
                    
JDK-8263828 Use ucrypto_free_context for clean operation in Solaris Ucrypto/pkcs11
-         
     - Resolved
 
 -         
 - 
                    
JDK-8264250 Use ucrypto_free_context for clean operation in Solaris Ucrypto/pkcs11
-         
     - Resolved
 
 -         
 - 
                    
JDK-8262850 Use ucrypto_free_context for clean operation in Solaris Ucrypto/pkcs11
-         
     - Resolved
 
 -         
 
- relates to
 - 
                    
JDK-8260340 Solaris native memory leak in libucrypto for GCM based Ciphers
-         
     - Closed
 
 -