Red Hat provides this information describing how the issue affects different products versions.
As described in the aforementioned link, it seems that no mitigation is provided:
Mitigation for this issue is either not available or the currently
available options do not meet the Red Hat Product Security criteria
comprising ease of use and deployment, applicability to widespread
installation base or stability.
In the specific use case of Red Hat Enterprise Linux 7, they indicate the product is "Out of support scope":
When a product is listed as "Out of Support Scope", it means a
vulnerability with the impact level assigned to this CVE is no longer
covered by its current support lifecycle phase. The product has
been identified to contain the impacted component, but analysis to
determine whether it is affected or not by this vulnerability was not
performed. The product should be assumed to be affected. Customers are
advised to apply any mitigation options documented on this page, consider
removing or disabling the impacted component, or upgrade to a supported
version of the product that has an update available.
This may explain, as VonC indicated in his question, why Grype doesn't report the problem.
If you need your image just for running Java, one thing you could try is removing the dependency, but I am afraid it is required by other libraries, so probably it will not work.
Please, take my words with caution because it entirely depends on your actual use case, but you may "safely" use your image as well. From the cited docs again:
This flaw is rated as Moderate because code execution is limited to the web
browser scope.
In fact, Red Hat itself provides similar images with the same problem.
Finally, if using Red Hat is not a strict requirement, you can choose another different Java distribution like OpenJDK or AdoptOpenJDK. For example:
docker pull openjdk:11.0.14.1-jdk