Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2022:0310 - Security Advisory
Issued:
2022-01-27
Updated:
2022-01-27

RHSA-2022:0310 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: java-1.7.1-ibm security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 7 Supplementary.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.

This update upgrades IBM Java SE 7 to version 7R1 SR5.

Security Fix(es):

  • OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565)
  • OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556)
  • OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559)
  • OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564)
  • OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) (CVE-2021-35586)
  • IBM JDK: IllegalAccessError exception not thrown for MethodHandles that invoke inaccessible interface methods (CVE-2021-41035)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of IBM Java must be restarted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le

Fixes

  • BZ - 2014508 - CVE-2021-35565 OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967)
  • BZ - 2014515 - CVE-2021-35556 OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167)
  • BZ - 2014518 - CVE-2021-35559 OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580)
  • BZ - 2015061 - CVE-2021-35564 OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137)
  • BZ - 2015308 - CVE-2021-35586 OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735)
  • BZ - 2027791 - CVE-2021-41035 IBM JDK: IllegalAccessError exception not thrown for MethodHandles that invoke inaccessible interface methods

CVEs

  • CVE-2021-35556
  • CVE-2021-35559
  • CVE-2021-35564
  • CVE-2021-35565
  • CVE-2021-35586
  • CVE-2021-41035

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
x86_64
java-1.7.1-ibm-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: e817e689d2295e8e83784701dccac9a95a232d14ce18b199a1d5779757563806
java-1.7.1-ibm-demo-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: efe393e6b9063a23f9553178d1abb8f971932a0027604ec213b9561b840088f2
java-1.7.1-ibm-devel-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 9244aa35c5c6f46018699caa1fb8f2f60ef9208be659c7b2184753a7947ae442
java-1.7.1-ibm-jdbc-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 097b4df506b0ba20fa37a4febaa72645f586e5b051c7ca1c1ce16fa7a2e28b46
java-1.7.1-ibm-plugin-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 8907bbf81f90946d675fff1662561ff6c994e1ddd3d81c0ddb0061830ed4a944
java-1.7.1-ibm-src-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 5569e09ac2626f3621d9bdf198fa9f4c733485543d6f124da0fa2d661efada58

Red Hat Enterprise Linux Workstation 7

SRPM
x86_64
java-1.7.1-ibm-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: e817e689d2295e8e83784701dccac9a95a232d14ce18b199a1d5779757563806
java-1.7.1-ibm-demo-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: efe393e6b9063a23f9553178d1abb8f971932a0027604ec213b9561b840088f2
java-1.7.1-ibm-devel-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 9244aa35c5c6f46018699caa1fb8f2f60ef9208be659c7b2184753a7947ae442
java-1.7.1-ibm-jdbc-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 097b4df506b0ba20fa37a4febaa72645f586e5b051c7ca1c1ce16fa7a2e28b46
java-1.7.1-ibm-plugin-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 8907bbf81f90946d675fff1662561ff6c994e1ddd3d81c0ddb0061830ed4a944
java-1.7.1-ibm-src-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 5569e09ac2626f3621d9bdf198fa9f4c733485543d6f124da0fa2d661efada58

Red Hat Enterprise Linux Desktop 7

SRPM
x86_64
java-1.7.1-ibm-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: e817e689d2295e8e83784701dccac9a95a232d14ce18b199a1d5779757563806
java-1.7.1-ibm-demo-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: efe393e6b9063a23f9553178d1abb8f971932a0027604ec213b9561b840088f2
java-1.7.1-ibm-devel-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 9244aa35c5c6f46018699caa1fb8f2f60ef9208be659c7b2184753a7947ae442
java-1.7.1-ibm-jdbc-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 097b4df506b0ba20fa37a4febaa72645f586e5b051c7ca1c1ce16fa7a2e28b46
java-1.7.1-ibm-plugin-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 8907bbf81f90946d675fff1662561ff6c994e1ddd3d81c0ddb0061830ed4a944
java-1.7.1-ibm-src-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 5569e09ac2626f3621d9bdf198fa9f4c733485543d6f124da0fa2d661efada58

Red Hat Enterprise Linux for IBM z Systems 7

SRPM
s390x
java-1.7.1-ibm-1.7.1.5.0-1jpp.1.el7.s390x.rpm SHA-256: 673a58de21355df53652185864950b1687c531ddbb4f4dc64a49ea304be1dbcc
java-1.7.1-ibm-demo-1.7.1.5.0-1jpp.1.el7.s390x.rpm SHA-256: b9135ca9205d1849161e274c682bd9e392cc459a850dc24ebb5081af0061155b
java-1.7.1-ibm-devel-1.7.1.5.0-1jpp.1.el7.s390x.rpm SHA-256: 28ea4bc61add99751f674786cf12ad6e4683ca70f53646fc58504d2bcdccf2f7
java-1.7.1-ibm-jdbc-1.7.1.5.0-1jpp.1.el7.s390x.rpm SHA-256: 68b73d2d71e7ef04e908c8e8ae8da5fc24b9a0af24b200fccf85c47490213b17
java-1.7.1-ibm-src-1.7.1.5.0-1jpp.1.el7.s390x.rpm SHA-256: 76effb7efed598c150ddfdba146d21470284a208a5d8d819ac6352d297557fe9

Red Hat Enterprise Linux for Power, big endian 7

SRPM
ppc64
java-1.7.1-ibm-1.7.1.5.0-1jpp.1.el7.ppc64.rpm SHA-256: 4b6de397cd97be7b2950e9b2028aaa9f45c9870659ae8b89af5a05d452c7fb4f
java-1.7.1-ibm-demo-1.7.1.5.0-1jpp.1.el7.ppc64.rpm SHA-256: b150cc5c1420b5474113c819e6431d8abd5f7d3a2218b975e6a06828c6b2645c
java-1.7.1-ibm-devel-1.7.1.5.0-1jpp.1.el7.ppc64.rpm SHA-256: f218f67a16ba5db02ca1fa91d35a899872324d25c786e4da7a8487add321cfb1
java-1.7.1-ibm-jdbc-1.7.1.5.0-1jpp.1.el7.ppc64.rpm SHA-256: 378536ab675efd1bbf1564f0e5567f081496b85af548aa406e91791ce1c0fadb
java-1.7.1-ibm-src-1.7.1.5.0-1jpp.1.el7.ppc64.rpm SHA-256: fc04c3e5e4adcb4ccc3c99943a0301f9dc2bfc56b166107192ff3eefa56f23ee

Red Hat Enterprise Linux for Scientific Computing 7

SRPM
x86_64
java-1.7.1-ibm-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: e817e689d2295e8e83784701dccac9a95a232d14ce18b199a1d5779757563806
java-1.7.1-ibm-demo-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: efe393e6b9063a23f9553178d1abb8f971932a0027604ec213b9561b840088f2
java-1.7.1-ibm-devel-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 9244aa35c5c6f46018699caa1fb8f2f60ef9208be659c7b2184753a7947ae442
java-1.7.1-ibm-src-1.7.1.5.0-1jpp.1.el7.x86_64.rpm SHA-256: 5569e09ac2626f3621d9bdf198fa9f4c733485543d6f124da0fa2d661efada58

Red Hat Enterprise Linux for Power, little endian 7

SRPM
ppc64le
java-1.7.1-ibm-1.7.1.5.0-1jpp.1.el7.ppc64le.rpm SHA-256: ea9f68dcb59fdc2de16d002530e0178e3cf34de9943889c259e3da2b4c94b567
java-1.7.1-ibm-demo-1.7.1.5.0-1jpp.1.el7.ppc64le.rpm SHA-256: 85f10aca62f2d81c3caa556e3fda9118c0cda9ca52ba5c12d4723cff200365e1
java-1.7.1-ibm-devel-1.7.1.5.0-1jpp.1.el7.ppc64le.rpm SHA-256: 59768b9f29dac0fe4bbaf4fbec6da8a7ea70ec391aa18e4f2b25c9ae8279ca4e
java-1.7.1-ibm-jdbc-1.7.1.5.0-1jpp.1.el7.ppc64le.rpm SHA-256: 72792aad9a57987be127405c5b79300ddcd3875277173219dced2f696ac62ece
java-1.7.1-ibm-src-1.7.1.5.0-1jpp.1.el7.ppc64le.rpm SHA-256: 310a604bcb42d3aa554ddf743a762e18694138dab02cc6aba5ec468d85530df5

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility