Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:0232 - Security Advisory
Issued:
2020-01-27
Updated:
2020-01-27

RHSA-2020:0232 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: java-11-openjdk security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) (CVE-2020-2601)
  • OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604)
  • OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590)
  • OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548) (CVE-2020-2593)
  • OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654)
  • OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780) (CVE-2020-2655)
  • OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of OpenJDK Java must be restarted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0 x86_64

Fixes

  • BZ - 1790444 - CVE-2020-2583 OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909)
  • BZ - 1790556 - CVE-2020-2590 OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352)
  • BZ - 1790570 - CVE-2020-2601 OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951)
  • BZ - 1790884 - CVE-2020-2593 OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548)
  • BZ - 1790944 - CVE-2020-2604 OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422)
  • BZ - 1790951 - CVE-2020-2655 OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780)
  • BZ - 1791217 - CVE-2020-2654 OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037)

CVEs

  • CVE-2020-2583
  • CVE-2020-2590
  • CVE-2020-2593
  • CVE-2020-2601
  • CVE-2020-2604
  • CVE-2020-2654
  • CVE-2020-2655

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0

SRPM
java-11-openjdk-11.0.6.10-0.el8_0.src.rpm SHA-256: 835cfafd137dfc10428242573602f7ac1109c3595ffea5d4d3937574cb374266
ppc64le
java-11-openjdk-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: a2d372e01d401cd9c00d2ddcfaa3276a8ff5e054fca74a714a40a5b9f209510e
java-11-openjdk-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 14e2723f57004a0ca5cd3fee788de70723e044eef4ac6f6a4631fa84a282dbce
java-11-openjdk-debugsource-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: e0a32c63ccc84022b66e17015d9309f8d433e6185b0c3d639b3bf2582e0fb2a8
java-11-openjdk-demo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 92fbf54679b91577c4628aaf73a71296d2badc1e7484ebc0125a2cb2bebcece9
java-11-openjdk-devel-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 855c6be41bd51a3dcc48f91f1aa6fade91f897e744ca88054ce199307e94dbb6
java-11-openjdk-devel-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: e3a3f4c3b34b8f179335e805f7de098dfc52244a812d5f32466e439210f800cc
java-11-openjdk-devel-slowdebug-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 66137234b347997828d91e79bd8c411f0d67d7546732b817234124b1101da583
java-11-openjdk-headless-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 9b8e3aaeb8af39c8d38a8fbcfc2d8b82e138b4e47f527720d7b8857c27a01ebc
java-11-openjdk-headless-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: aef3535a14d752e0d0ca58425a5ccd5853582763eec5910862a5e4a2ddddcc31
java-11-openjdk-headless-slowdebug-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: b9f2b2ddd5903309a1394ffe4590e3b2c81a9731f25f160719a6eff2686acddf
java-11-openjdk-javadoc-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 4e37b8d917c80c53564f7fd844c1c2e01c5dc9a21364727e84b38adf4d53f362
java-11-openjdk-javadoc-zip-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: e39779be6aace6d7f24ac5b7f1e9dc7a210703cb6555c7870daa6d1b8ebec95d
java-11-openjdk-jmods-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: af9d218ff86a71fbd51c05b74c44b1665f87d56a35e40f952956e454e63f745a
java-11-openjdk-slowdebug-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 55515e34c03fdcd2ab7158aa6218253388b2a4762ac5787517fcfdbba0caf363
java-11-openjdk-src-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: f934979fc63cf024b8d5db7625499c328b1e9a34a6721cce18349970413f77e2

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0

SRPM
java-11-openjdk-11.0.6.10-0.el8_0.src.rpm SHA-256: 835cfafd137dfc10428242573602f7ac1109c3595ffea5d4d3937574cb374266
x86_64
java-11-openjdk-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 68b72cb7b2db0b22dbcbec006f25c7e93d72e8bd107374efe073db1fa90b342d
java-11-openjdk-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 9b3cca9113b69f4b352b7ed3aa202d383a60c5af1eb05011e336c795b5282dc7
java-11-openjdk-debugsource-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 5c96a0e623262978f15e5953b095a085e417c6cc6311d1318abc5b7b7fbf8961
java-11-openjdk-demo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 591dc92e945f5f0e3af107e3ba5684748eb760f2e381f7724ce5ee70e1e15a6c
java-11-openjdk-devel-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: c5859a7ab88a9c2e503f81553f4e22f9cef9fe3195d189fe4e3191d1c099dc77
java-11-openjdk-devel-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 3d0de4374e735c26bcd042e9b6a90526c17b5fc842223c4d3f9f046f626a19cc
java-11-openjdk-devel-slowdebug-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 46ad035e45af9170ac3604b1873af2769172dd20ce67801ec977cde3d8a7454b
java-11-openjdk-headless-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: f2be9a7fa682ff547b7fe30be5d9a305bf4fff419109f7fb7704ac31a00aba4c
java-11-openjdk-headless-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 9c9d6cc43b3bc14a7da9738ac4336e2be87099a9cd759e1957d49c622da1cc59
java-11-openjdk-headless-slowdebug-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: ce20666827d00fbdc1361aac4c1965611cc0c49c20f0a0d4676312bd42972f32
java-11-openjdk-javadoc-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 8ce4594fd40342e8bb34397e0b76aa0757718530ce85de4263a34b48f82dab92
java-11-openjdk-javadoc-zip-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 54fee7b1fd3944bb66b59e266b4ea3dff625d6b86003b5f135a3fa4f6b488c34
java-11-openjdk-jmods-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 09e22e7afc7a6d700c818ce3528e12282d52ca8c0f2692a751fc1771912a59b4
java-11-openjdk-slowdebug-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: f2353e7f08710d61de0d16d047f3c563731fe56dcc519b35448aea48bf242435
java-11-openjdk-src-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 896823d57006c5c5276800df14e4937d2d57718d49c8ff43ba89960d4105313d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility