Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:0717 - Security Advisory
Issued:
2021-03-03
Updated:
2021-03-03

RHSA-2021:0717 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: java-1.8.0-ibm security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 7 Supplementary.

Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 8 to version 8 SR6-FP25.

Security Fix(es):

  • IBM JDK: Stack-based buffer overflow when converting from UTF-8 characters to platform encoding (CVE-2020-27221)
  • OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773)
  • OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781)
  • OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782)
  • OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of IBM Java must be restarted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le

Fixes

  • BZ - 1823224 - CVE-2020-2773 OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415)
  • BZ - 1889274 - CVE-2020-14781 OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990)
  • BZ - 1889290 - CVE-2020-14782 OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995)
  • BZ - 1889895 - CVE-2020-14803 OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)
  • BZ - 1928555 - CVE-2020-27221 IBM JDK: Stack-based buffer overflow when converting from UTF-8 characters to platform encoding

CVEs

  • CVE-2020-2773
  • CVE-2020-14781
  • CVE-2020-14782
  • CVE-2020-14803
  • CVE-2020-27221

References

  • https://access.redhat.com/security/updates/classification/#critical
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
x86_64
java-1.8.0-ibm-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 1ed5666602e7d23939aba942afea292342fc84ebd495f0581a3bba46f2f20a6c
java-1.8.0-ibm-demo-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 7e587ea92381861b4a235c8918665e14a4008f2d73d2c7f10ac4cc5c8d7ab1ca
java-1.8.0-ibm-devel-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: bd2816ddbc4499ad77fa0a6eca5973f8d213dad2c08ea10e136c509dc51a7a7b
java-1.8.0-ibm-jdbc-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 677c599e1d5be845d0a62a6e63839e8aa342f568a9b274e5b98908f162b75c50
java-1.8.0-ibm-plugin-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: c691c46c13c5820693fe141def18f43b5a8652125ba7cc9765be37f0097f26d9
java-1.8.0-ibm-src-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 17cfb465b849bbdf235a2fd0721d068f2fb3c26072b5f3ed6aa204d6fcb1dd51

Red Hat Enterprise Linux Workstation 7

SRPM
x86_64
java-1.8.0-ibm-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 1ed5666602e7d23939aba942afea292342fc84ebd495f0581a3bba46f2f20a6c
java-1.8.0-ibm-demo-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 7e587ea92381861b4a235c8918665e14a4008f2d73d2c7f10ac4cc5c8d7ab1ca
java-1.8.0-ibm-devel-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: bd2816ddbc4499ad77fa0a6eca5973f8d213dad2c08ea10e136c509dc51a7a7b
java-1.8.0-ibm-jdbc-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 677c599e1d5be845d0a62a6e63839e8aa342f568a9b274e5b98908f162b75c50
java-1.8.0-ibm-plugin-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: c691c46c13c5820693fe141def18f43b5a8652125ba7cc9765be37f0097f26d9
java-1.8.0-ibm-src-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 17cfb465b849bbdf235a2fd0721d068f2fb3c26072b5f3ed6aa204d6fcb1dd51

Red Hat Enterprise Linux Desktop 7

SRPM
x86_64
java-1.8.0-ibm-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 1ed5666602e7d23939aba942afea292342fc84ebd495f0581a3bba46f2f20a6c
java-1.8.0-ibm-demo-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 7e587ea92381861b4a235c8918665e14a4008f2d73d2c7f10ac4cc5c8d7ab1ca
java-1.8.0-ibm-devel-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: bd2816ddbc4499ad77fa0a6eca5973f8d213dad2c08ea10e136c509dc51a7a7b
java-1.8.0-ibm-jdbc-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 677c599e1d5be845d0a62a6e63839e8aa342f568a9b274e5b98908f162b75c50
java-1.8.0-ibm-plugin-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: c691c46c13c5820693fe141def18f43b5a8652125ba7cc9765be37f0097f26d9
java-1.8.0-ibm-src-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 17cfb465b849bbdf235a2fd0721d068f2fb3c26072b5f3ed6aa204d6fcb1dd51

Red Hat Enterprise Linux for IBM z Systems 7

SRPM
s390x
java-1.8.0-ibm-1.8.0.6.25-1jpp.1.el7.s390x.rpm SHA-256: 473f9139c0a4ca07d826a4505d93ce0fc5a12a4202a8f8f9da1caa066b94b130
java-1.8.0-ibm-demo-1.8.0.6.25-1jpp.1.el7.s390x.rpm SHA-256: 5bd6352f9af0579373521b77bff1c972bddcafaab5e08f8b4238093bdee8bf3f
java-1.8.0-ibm-devel-1.8.0.6.25-1jpp.1.el7.s390x.rpm SHA-256: 3f8fa4a5693ad2bc4e10eeba0a9161828d1d38a2279e93b4b59e4e0bbf134eb0
java-1.8.0-ibm-jdbc-1.8.0.6.25-1jpp.1.el7.s390x.rpm SHA-256: 3198f0277d60722adc2e1720142c90312906764a5202f46b20d67dfe7696db79
java-1.8.0-ibm-src-1.8.0.6.25-1jpp.1.el7.s390x.rpm SHA-256: 0cd95c40cd2e3f3de752cb73e529da18cfa047b1999e5187f07e026303f0787e

Red Hat Enterprise Linux for Power, big endian 7

SRPM
ppc64
java-1.8.0-ibm-1.8.0.6.25-1jpp.1.el7.ppc64.rpm SHA-256: bb98fdacacc55b39ae6af276075b179461abc1501bed8d6e63a10317a0a2c8db
java-1.8.0-ibm-demo-1.8.0.6.25-1jpp.1.el7.ppc64.rpm SHA-256: 594d647e9bf8189114a05dacf8d8510b2bda8ef0a9bdd0699d5e6b6f23d41734
java-1.8.0-ibm-devel-1.8.0.6.25-1jpp.1.el7.ppc64.rpm SHA-256: 9335d57310a8ed16986a84e1121c3647292f77ac6859eac020416b7e87a4be89
java-1.8.0-ibm-jdbc-1.8.0.6.25-1jpp.1.el7.ppc64.rpm SHA-256: 586a2d92cfdd453a22793f04fd68135889d9068e56fddf38f733a0297a7fe0fc
java-1.8.0-ibm-plugin-1.8.0.6.25-1jpp.1.el7.ppc64.rpm SHA-256: ad6c4010b21bf46dbc2ea4a08bdc6467efd6042e6ebc4b87573b8e7d99a11b51
java-1.8.0-ibm-src-1.8.0.6.25-1jpp.1.el7.ppc64.rpm SHA-256: c5abd7f2e2b18e44d9eb5aaaabbef07fa16f45260d5f8c679cc205609ecbd778

Red Hat Enterprise Linux for Scientific Computing 7

SRPM
x86_64
java-1.8.0-ibm-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 1ed5666602e7d23939aba942afea292342fc84ebd495f0581a3bba46f2f20a6c
java-1.8.0-ibm-demo-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 7e587ea92381861b4a235c8918665e14a4008f2d73d2c7f10ac4cc5c8d7ab1ca
java-1.8.0-ibm-devel-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: bd2816ddbc4499ad77fa0a6eca5973f8d213dad2c08ea10e136c509dc51a7a7b
java-1.8.0-ibm-src-1.8.0.6.25-1jpp.1.el7.x86_64.rpm SHA-256: 17cfb465b849bbdf235a2fd0721d068f2fb3c26072b5f3ed6aa204d6fcb1dd51

Red Hat Enterprise Linux for Power, little endian 7

SRPM
ppc64le
java-1.8.0-ibm-1.8.0.6.25-1jpp.1.el7.ppc64le.rpm SHA-256: 38d42d7d9d585bb088ef27ebea88ded7172296817301369fc705669214803c5a
java-1.8.0-ibm-demo-1.8.0.6.25-1jpp.1.el7.ppc64le.rpm SHA-256: fdbd5a3940059e9176a809ffdcd9104604fbfd9548a8317d29e0ddae9c7d52c3
java-1.8.0-ibm-devel-1.8.0.6.25-1jpp.1.el7.ppc64le.rpm SHA-256: 7a1a823ed7812591379efc8c6f54ef371071bf40a4ae73b11e803d70714f713d
java-1.8.0-ibm-jdbc-1.8.0.6.25-1jpp.1.el7.ppc64le.rpm SHA-256: c5de9dbdc1f2b07b70d8c0673d4ea629f6e58a077e521d8520063f05e2dde5f5
java-1.8.0-ibm-src-1.8.0.6.25-1jpp.1.el7.ppc64le.rpm SHA-256: 2a44816d2d6f770d4065cd3cf93872a28de95608b1d7cce299383934a40174c4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility