First published: Mon Mar 21 2022(Updated: )
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.<br>This update upgrades IBM Java SE 8 to version 8 SR7-FP5.<br>Security Fix(es):<br><li> OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550)</li> <li> OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248)</li> <li> OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293)</li> <li> OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294)</li> <li> OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340)</li> <li> OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341)</li> <li> OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) (CVE-2022-21360)</li> <li> OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365)</li> <li> OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.8.0-ibm-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-demo-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-demo-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-devel-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-devel-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-jdbc-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-jdbc-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-plugin-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-plugin-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-src-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-src-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-demo-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-demo-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-devel-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-devel-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-jdbc-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-jdbc-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-src-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-src-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-plugin-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-plugin-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-demo-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-demo-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-devel-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-devel-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-jdbc-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-jdbc-1.8.0.7.5-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-src-1.8.0.7.5-1jpp.1.el7 | 1.8.0-ibm-src-1.8.0.7.5-1jpp.1.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0968 is considered moderate due to the potential for weak ciphers to be favored over stronger ones in TLS connections.
To fix RHSA-2022:0968, update your IBM Java SE to version 8 SR7-FP5 as recommended in the advisory.
RHSA-2022:0968 affects several versions of IBM Java SE 8, specifically versions prior to 1.8.0-ibm-1.8.0.7.5-1jpp.1.el7.
Not addressing RHSA-2022:0968 could expose applications using IBM Java SE to vulnerabilities related to weak TLS ciphers, increasing the risk of security breaches.
Generally, applying the fix for RHSA-2022:0968 should enhance security without negatively impacting application performance.