Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:0225 - Security Advisory
Issued:
2024-01-17
Updated:
2024-01-17

RHSA-2024:0225 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: java-1.8.0-openjdk security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918)
  • OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952)
  • OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919)
  • OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921)
  • OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926)
  • OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • In the previous release in October 2023 (8u392), the RPMs were changed to use Provides for java, jre, java-headless, jre-headless, java-devel and java-sdk which included the full RPM version. This prevented the Provides being used to resolve a dependency on Java 1.8.0 (for example, "Requires: java-headless 1:1.8.0"). This change has now been reverted to the old "1:1.8.0" value. (RHEL-19634)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of OpenJDK Java must be restarted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2257728 - CVE-2024-20918 OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468)
  • BZ - 2257837 - CVE-2024-20952 OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
  • BZ - 2257850 - CVE-2024-20926 OpenJDK: arbitrary Java code execution in Nashorn (8314284)
  • BZ - 2257853 - CVE-2024-20919 OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295)
  • BZ - 2257859 - CVE-2024-20921 OpenJDK: range check loop optimization issue (8314307)
  • BZ - 2257874 - CVE-2024-20945 OpenJDK: logging of digital signature private keys (8316976)

CVEs

  • CVE-2024-20918
  • CVE-2024-20919
  • CVE-2024-20921
  • CVE-2024-20926
  • CVE-2024-20945
  • CVE-2024-20952

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4

SRPM
java-1.8.0-openjdk-1.8.0.402.b06-1.el8_4.src.rpm SHA-256: 15722577e45190feb709744cab733b4e6ef1e27f25db746fdb9040aba44256a9
x86_64
java-1.8.0-openjdk-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: b6acf4d734b77ca2be1c044227b77eac381ef39fa6a436e977bbe0bf571680ea
java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 73ce8d5b4c2d5182dd78aa9acdd8aa09e5bdf27bb01713431fe1e2c95d43d76c
java-1.8.0-openjdk-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 4a54d28b2b6de205800822e96067f3e9f066a083acc4ee6088c43fda5e92bb44
java-1.8.0-openjdk-debugsource-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: a70648a939637c5223bc1763e7da6848f22df94e46d542cda583e9dd2f7a61a8
java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: f754bb6d7ad5d7edac35e1771ea7fbce404f4c7c1660803f3c3a4103b70050bb
java-1.8.0-openjdk-demo-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 1b7ee06b1ca8233cebd7cddae670bbd05fbfecf0db4e12706c46867aef057b7c
java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: c3c33672b170ee79b0bc67ecf144009fc3b0360ca208c315f082cac5da3810f7
java-1.8.0-openjdk-devel-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 2c0617270ffda8a4f4cffd32eb5222c4a16a517f9412ac41471f080332784b7e
java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: f231eaa97528868d3c99b282a5e01a84fac4b7fb276c0865bc04c07ac607f078
java-1.8.0-openjdk-headless-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: e146459b6fe84cd5c6985d237c1f12cea4d2c85763a736bee98b1eb5eac22b83
java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el8_4.noarch.rpm SHA-256: 22cbdba1a111a16579d901abce17052d6f9af0f1d397b5b32ee970c0c2403ef5
java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el8_4.noarch.rpm SHA-256: ce7e79f6c5769203889473f6626d76dd3e398717d43404f19f36a1ba112ad251
java-1.8.0-openjdk-src-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: fbeaf246ee41186e3df247a17b441710970e0e5550369001b611dde60ad0e996

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
java-1.8.0-openjdk-1.8.0.402.b06-1.el8_4.src.rpm SHA-256: 15722577e45190feb709744cab733b4e6ef1e27f25db746fdb9040aba44256a9
x86_64
java-1.8.0-openjdk-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: b6acf4d734b77ca2be1c044227b77eac381ef39fa6a436e977bbe0bf571680ea
java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 73ce8d5b4c2d5182dd78aa9acdd8aa09e5bdf27bb01713431fe1e2c95d43d76c
java-1.8.0-openjdk-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 4a54d28b2b6de205800822e96067f3e9f066a083acc4ee6088c43fda5e92bb44
java-1.8.0-openjdk-debugsource-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: a70648a939637c5223bc1763e7da6848f22df94e46d542cda583e9dd2f7a61a8
java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: f754bb6d7ad5d7edac35e1771ea7fbce404f4c7c1660803f3c3a4103b70050bb
java-1.8.0-openjdk-demo-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 1b7ee06b1ca8233cebd7cddae670bbd05fbfecf0db4e12706c46867aef057b7c
java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 0c190615b19eafa96d0ef73cb34ac12026363aa69b9c2f392e553e0cf6f07e3e
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 214bd4b6d57ae4d393567594b2faa2c7423ae3f08c66bd42e5a301f68aaba09f
java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: c3c33672b170ee79b0bc67ecf144009fc3b0360ca208c315f082cac5da3810f7
java-1.8.0-openjdk-devel-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 2c0617270ffda8a4f4cffd32eb5222c4a16a517f9412ac41471f080332784b7e
java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 96573def69414a52e358f7b0c51f550ee057a0a6d41fffda590bbfcb4e2e64f1
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: fed58280b636f358370edfe8301d6f8f86e7a7d9d33dbd89ca5fc15b10b161f6
java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: e217a6a64cfd45fe33fd0428c1659c09df3391caae4bb127c4fefd9c7dd8390f
java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: f231eaa97528868d3c99b282a5e01a84fac4b7fb276c0865bc04c07ac607f078
java-1.8.0-openjdk-headless-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: e146459b6fe84cd5c6985d237c1f12cea4d2c85763a736bee98b1eb5eac22b83
java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 5674be47668a7700717cc2a8e396fb09b3cc99c936f92e7c20579aaeaae57e3c
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: d3685ce97970639e20329bbeb2431f933322f9fff3b8cbc97900a9c520db2aa0
java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el8_4.noarch.rpm SHA-256: 22cbdba1a111a16579d901abce17052d6f9af0f1d397b5b32ee970c0c2403ef5
java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el8_4.noarch.rpm SHA-256: ce7e79f6c5769203889473f6626d76dd3e398717d43404f19f36a1ba112ad251
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 02bec812135555a419f02fd6b493c74ecfed0969aa51aaec505a5fdf211f44fd
java-1.8.0-openjdk-src-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: fbeaf246ee41186e3df247a17b441710970e0e5550369001b611dde60ad0e996

Red Hat Enterprise Linux Server - TUS 8.4

SRPM
java-1.8.0-openjdk-1.8.0.402.b06-1.el8_4.src.rpm SHA-256: 15722577e45190feb709744cab733b4e6ef1e27f25db746fdb9040aba44256a9
x86_64
java-1.8.0-openjdk-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: b6acf4d734b77ca2be1c044227b77eac381ef39fa6a436e977bbe0bf571680ea
java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 73ce8d5b4c2d5182dd78aa9acdd8aa09e5bdf27bb01713431fe1e2c95d43d76c
java-1.8.0-openjdk-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 4a54d28b2b6de205800822e96067f3e9f066a083acc4ee6088c43fda5e92bb44
java-1.8.0-openjdk-debugsource-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: a70648a939637c5223bc1763e7da6848f22df94e46d542cda583e9dd2f7a61a8
java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: f754bb6d7ad5d7edac35e1771ea7fbce404f4c7c1660803f3c3a4103b70050bb
java-1.8.0-openjdk-demo-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 1b7ee06b1ca8233cebd7cddae670bbd05fbfecf0db4e12706c46867aef057b7c
java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: c3c33672b170ee79b0bc67ecf144009fc3b0360ca208c315f082cac5da3810f7
java-1.8.0-openjdk-devel-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 2c0617270ffda8a4f4cffd32eb5222c4a16a517f9412ac41471f080332784b7e
java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: f231eaa97528868d3c99b282a5e01a84fac4b7fb276c0865bc04c07ac607f078
java-1.8.0-openjdk-headless-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: e146459b6fe84cd5c6985d237c1f12cea4d2c85763a736bee98b1eb5eac22b83
java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el8_4.noarch.rpm SHA-256: 22cbdba1a111a16579d901abce17052d6f9af0f1d397b5b32ee970c0c2403ef5
java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el8_4.noarch.rpm SHA-256: ce7e79f6c5769203889473f6626d76dd3e398717d43404f19f36a1ba112ad251
java-1.8.0-openjdk-src-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: fbeaf246ee41186e3df247a17b441710970e0e5550369001b611dde60ad0e996

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM
java-1.8.0-openjdk-1.8.0.402.b06-1.el8_4.src.rpm SHA-256: 15722577e45190feb709744cab733b4e6ef1e27f25db746fdb9040aba44256a9
ppc64le
java-1.8.0-openjdk-1.8.0.402.b06-1.el8_4.ppc64le.rpm SHA-256: bce2ad1bb5f550b33bd6695ea85ca01dc70336a97cfc2b20d5397ca28c76db3e
java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el8_4.ppc64le.rpm SHA-256: ab5b7156a53a9f79af3e8b628a19fdb1e1acd8c0f21dfabdc243c452b4fc3f60
java-1.8.0-openjdk-debuginfo-1.8.0.402.b06-1.el8_4.ppc64le.rpm SHA-256: 7f5809c5bcdb39a07b40dfe8e19f340e627c2fdfe022591cecfb42491214ca5c
java-1.8.0-openjdk-debugsource-1.8.0.402.b06-1.el8_4.ppc64le.rpm SHA-256: 1abc52808d178305f8f324c74c89eff9afd51deaf6b6d629e02d451735820e6c
java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el8_4.ppc64le.rpm SHA-256: c233b61ed51ad69789c79bbaad137c393ff5748771ef3d0f2d6252fdc5623d2c
java-1.8.0-openjdk-demo-debuginfo-1.8.0.402.b06-1.el8_4.ppc64le.rpm SHA-256: 8c603081e950b5c5e7625493763690efe42321452a2205920a67d69630abc71f
java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el8_4.ppc64le.rpm SHA-256: 52f98c0541ce908611782bcf97890cccc5caf4b2556875fca8367ea11db32ba8
java-1.8.0-openjdk-devel-debuginfo-1.8.0.402.b06-1.el8_4.ppc64le.rpm SHA-256: 85a0bae32e7d71225209b95b11cb3c844db768feab0bffe761d8c7ee70c6b28f
java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el8_4.ppc64le.rpm SHA-256: 1ded20c4836165fa59519d4bb085a31ea40ad5b8fa07a15719692260127c9a84
java-1.8.0-openjdk-headless-debuginfo-1.8.0.402.b06-1.el8_4.ppc64le.rpm SHA-256: 4ac7db4982171aca56ee6f6fc1d61b5d33bbe97005c9cd7c4431a2ceb8f25919
java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el8_4.noarch.rpm SHA-256: 22cbdba1a111a16579d901abce17052d6f9af0f1d397b5b32ee970c0c2403ef5
java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el8_4.noarch.rpm SHA-256: ce7e79f6c5769203889473f6626d76dd3e398717d43404f19f36a1ba112ad251
java-1.8.0-openjdk-src-1.8.0.402.b06-1.el8_4.ppc64le.rpm SHA-256: 6c4561ca9998940c9a4372f4eeef31f06fd6ef2ee8693eb5afe2b9f607dc68e5

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM
java-1.8.0-openjdk-1.8.0.402.b06-1.el8_4.src.rpm SHA-256: 15722577e45190feb709744cab733b4e6ef1e27f25db746fdb9040aba44256a9
x86_64
java-1.8.0-openjdk-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: b6acf4d734b77ca2be1c044227b77eac381ef39fa6a436e977bbe0bf571680ea
java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 73ce8d5b4c2d5182dd78aa9acdd8aa09e5bdf27bb01713431fe1e2c95d43d76c
java-1.8.0-openjdk-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 4a54d28b2b6de205800822e96067f3e9f066a083acc4ee6088c43fda5e92bb44
java-1.8.0-openjdk-debugsource-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: a70648a939637c5223bc1763e7da6848f22df94e46d542cda583e9dd2f7a61a8
java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: f754bb6d7ad5d7edac35e1771ea7fbce404f4c7c1660803f3c3a4103b70050bb
java-1.8.0-openjdk-demo-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 1b7ee06b1ca8233cebd7cddae670bbd05fbfecf0db4e12706c46867aef057b7c
java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: c3c33672b170ee79b0bc67ecf144009fc3b0360ca208c315f082cac5da3810f7
java-1.8.0-openjdk-devel-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: 2c0617270ffda8a4f4cffd32eb5222c4a16a517f9412ac41471f080332784b7e
java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: f231eaa97528868d3c99b282a5e01a84fac4b7fb276c0865bc04c07ac607f078
java-1.8.0-openjdk-headless-debuginfo-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: e146459b6fe84cd5c6985d237c1f12cea4d2c85763a736bee98b1eb5eac22b83
java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el8_4.noarch.rpm SHA-256: 22cbdba1a111a16579d901abce17052d6f9af0f1d397b5b32ee970c0c2403ef5
java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el8_4.noarch.rpm SHA-256: ce7e79f6c5769203889473f6626d76dd3e398717d43404f19f36a1ba112ad251
java-1.8.0-openjdk-src-1.8.0.402.b06-1.el8_4.x86_64.rpm SHA-256: fbeaf246ee41186e3df247a17b441710970e0e5550369001b611dde60ad0e996

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility