Skip to navigation Skip to main content

Utilities

  • Abonnements
  • Téléchargements
  • Console Red Hat
  • Assistance
Red Hat Customer Portal
  • Abonnements
  • Téléchargements
  • Console Red Hat
  • Assistance
  • Produits

    Produits Phares

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    Tous les produits

    Téléchargements et Conteneurs

    • Téléchargements
    • Packages
    • Containers

    Ressources principales

    • Documentation produits
    • Cycles de vie des produits
    • Conformité produits
    • Errata
  • Base de Connaisances

    Red Hat Knowledge Center

    • Solutions Knowledgebase
    • Articles Knowledgebase
    • Labs Portail Client
    • Errata

    Docs Produits phares

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    Toutes les Docs Produits

    Formation et Certification

    • À Propos
    • Index Cours
    • Index Certification
    • Skill Assessment
  • Sécurité

    Centre de Sécurité des Produits Red Hat

    • Mises à jour de sécurité
    • Alertes de Sécurité
    • Base de données CVE Red Hat
    • Errata

    References

    • Bulletins de sécurité
    • Indices de gravité
    • Données de sécurité

    Top Ressources

    • Labs de sécurité
    • Règles de rétroportage
    • Blog sécurité
  • Support

    Support Red Hat

    • Dossiers d'assistance
    • Résolution de panne
    • Obtenir de l'assistance
    • Contacter Red Hat Support

    Support Communauté Red Hat

    • Communauté Portail Client
    • Discussions Communauté
    • Red Hat Accelerator Program

    Top Ressources

    • Cycles de vie des produits
    • Labs Portail Client
    • Configurations prises en charge par Red Hat Jboss
    • Red Hat Lightspeed
Ou dépanner un problème.

Sélectionnez la langue

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure et gestion

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Informatique Cloud

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Stockage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Intégration et automatisation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
Tous les produits
Errata des produits Red Hat RHSA-2020:0232 - Security Advisory
Publié :
2020-01-27
Mis à jour :
2020-01-27

RHSA-2020:0232 - Security Advisory

  • Aperçu général
  • Paquets mis à jour

Synopsis

Important: java-11-openjdk security update

Type / Sévérité

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identifiez et remédiez aux systèmes concernés par cette alerte.

Voir les systèmes concernés

Sujet

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) (CVE-2020-2601)
  • OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604)
  • OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590)
  • OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548) (CVE-2020-2593)
  • OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654)
  • OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780) (CVE-2020-2655)
  • OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of OpenJDK Java must be restarted for this update to take effect.

Produits concernés

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0 x86_64

Correctifs

  • BZ - 1790444 - CVE-2020-2583 OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909)
  • BZ - 1790556 - CVE-2020-2590 OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352)
  • BZ - 1790570 - CVE-2020-2601 OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951)
  • BZ - 1790884 - CVE-2020-2593 OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548)
  • BZ - 1790944 - CVE-2020-2604 OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422)
  • BZ - 1790951 - CVE-2020-2655 OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780)
  • BZ - 1791217 - CVE-2020-2654 OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037)

CVE

  • CVE-2020-2583
  • CVE-2020-2590
  • CVE-2020-2593
  • CVE-2020-2601
  • CVE-2020-2604
  • CVE-2020-2654
  • CVE-2020-2655

Références

  • https://access.redhat.com/security/updates/classification/#important
Remarque: Il existe peut-être des versions plus récentes de ces paquets. Cliquer sur un nom de paquet pour obtenir plus de détails.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.0

SRPM
java-11-openjdk-11.0.6.10-0.el8_0.src.rpm SHA-256: 835cfafd137dfc10428242573602f7ac1109c3595ffea5d4d3937574cb374266
ppc64le
java-11-openjdk-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: a2d372e01d401cd9c00d2ddcfaa3276a8ff5e054fca74a714a40a5b9f209510e
java-11-openjdk-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 14e2723f57004a0ca5cd3fee788de70723e044eef4ac6f6a4631fa84a282dbce
java-11-openjdk-debugsource-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: e0a32c63ccc84022b66e17015d9309f8d433e6185b0c3d639b3bf2582e0fb2a8
java-11-openjdk-demo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 92fbf54679b91577c4628aaf73a71296d2badc1e7484ebc0125a2cb2bebcece9
java-11-openjdk-devel-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 855c6be41bd51a3dcc48f91f1aa6fade91f897e744ca88054ce199307e94dbb6
java-11-openjdk-devel-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: e3a3f4c3b34b8f179335e805f7de098dfc52244a812d5f32466e439210f800cc
java-11-openjdk-devel-slowdebug-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 66137234b347997828d91e79bd8c411f0d67d7546732b817234124b1101da583
java-11-openjdk-headless-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 9b8e3aaeb8af39c8d38a8fbcfc2d8b82e138b4e47f527720d7b8857c27a01ebc
java-11-openjdk-headless-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: aef3535a14d752e0d0ca58425a5ccd5853582763eec5910862a5e4a2ddddcc31
java-11-openjdk-headless-slowdebug-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: b9f2b2ddd5903309a1394ffe4590e3b2c81a9731f25f160719a6eff2686acddf
java-11-openjdk-javadoc-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 4e37b8d917c80c53564f7fd844c1c2e01c5dc9a21364727e84b38adf4d53f362
java-11-openjdk-javadoc-zip-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: e39779be6aace6d7f24ac5b7f1e9dc7a210703cb6555c7870daa6d1b8ebec95d
java-11-openjdk-jmods-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: af9d218ff86a71fbd51c05b74c44b1665f87d56a35e40f952956e454e63f745a
java-11-openjdk-slowdebug-debuginfo-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: 55515e34c03fdcd2ab7158aa6218253388b2a4762ac5787517fcfdbba0caf363
java-11-openjdk-src-11.0.6.10-0.el8_0.ppc64le.rpm SHA-256: f934979fc63cf024b8d5db7625499c328b1e9a34a6721cce18349970413f77e2

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.0

SRPM
java-11-openjdk-11.0.6.10-0.el8_0.src.rpm SHA-256: 835cfafd137dfc10428242573602f7ac1109c3595ffea5d4d3937574cb374266
x86_64
java-11-openjdk-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 68b72cb7b2db0b22dbcbec006f25c7e93d72e8bd107374efe073db1fa90b342d
java-11-openjdk-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 9b3cca9113b69f4b352b7ed3aa202d383a60c5af1eb05011e336c795b5282dc7
java-11-openjdk-debugsource-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 5c96a0e623262978f15e5953b095a085e417c6cc6311d1318abc5b7b7fbf8961
java-11-openjdk-demo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 591dc92e945f5f0e3af107e3ba5684748eb760f2e381f7724ce5ee70e1e15a6c
java-11-openjdk-devel-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: c5859a7ab88a9c2e503f81553f4e22f9cef9fe3195d189fe4e3191d1c099dc77
java-11-openjdk-devel-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 3d0de4374e735c26bcd042e9b6a90526c17b5fc842223c4d3f9f046f626a19cc
java-11-openjdk-devel-slowdebug-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 46ad035e45af9170ac3604b1873af2769172dd20ce67801ec977cde3d8a7454b
java-11-openjdk-headless-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: f2be9a7fa682ff547b7fe30be5d9a305bf4fff419109f7fb7704ac31a00aba4c
java-11-openjdk-headless-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 9c9d6cc43b3bc14a7da9738ac4336e2be87099a9cd759e1957d49c622da1cc59
java-11-openjdk-headless-slowdebug-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: ce20666827d00fbdc1361aac4c1965611cc0c49c20f0a0d4676312bd42972f32
java-11-openjdk-javadoc-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 8ce4594fd40342e8bb34397e0b76aa0757718530ce85de4263a34b48f82dab92
java-11-openjdk-javadoc-zip-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 54fee7b1fd3944bb66b59e266b4ea3dff625d6b86003b5f135a3fa4f6b488c34
java-11-openjdk-jmods-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 09e22e7afc7a6d700c818ce3528e12282d52ca8c0f2692a751fc1771912a59b4
java-11-openjdk-slowdebug-debuginfo-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: f2353e7f08710d61de0d16d047f3c563731fe56dcc519b35448aea48bf242435
java-11-openjdk-src-11.0.6.10-0.el8_0.x86_64.rpm SHA-256: 896823d57006c5c5276800df14e4937d2d57718d49c8ff43ba89960d4105313d

Le contact Red Hat Security est secalert@redhat.com. Plus d'infos contact à https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Liens rapides

  • Téléchargements
  • Abonnements
  • Dossiers d'assistance
  • Service client
  • Documentation produit

Aide

  • Nous contacter
  • FAQ du Portail Client
  • Aide relative à la connexion

Informations sur le site

  • Faire confiance à Red Hat
  • Politique de prise en charge des navigateurs
  • Accessibilité
  • Prix & récompenses
  • Colophon

Sites sur le même sujet

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • À propos de Red Hat
  • Jobs
  • Événements
  • Emplacements
  • Contactez Red Hat
  • Blog Red Hat
  • Inclusion at Red Hat
  • Red Hat Cool Shop
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Déclaration de confidentialité
  • Conditions d'utilisation
  • Toutes les politiques et directives
  • Accessibilité numérique