- Issued:
- 2022-12-14
- Updated:
- 2022-12-14
RHSA-2022:8761 - Security Advisory
Synopsis
Moderate: Red Hat support for Spring Boot 2.7.2 update
Type/Severity
Security Advisory: Moderate
Topic
An update is now available for Red Hat OpenShift Application Runtimes.
Description
Red Hat support for Spring Boot provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.
This release of Red Hat support for Spring Boot 2.7.2 serves as a replacement for Red Hat support for Spring Boot 2.5.12, and includes security, bug fixes and enhancements. For more information, see the release notes listed in the References section.
Security Fix(es):
- reactor-netty: specific redirect configuration allows for a credentials leak (CVE-2020-5404)
- kubernetes-client: Insecure deserialization in unmarshalYaml method (CVE-2021-4178)
- protobuf-java: potential DoS in the parsing procedure for binary data (CVE-2021-22569)
- undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) (CVE-2022-1259)
- undertow: Double AJP response for 400 from EAP 7 results in CPING failures (CVE-2022-1319)
- spring-expression: Denial of service via specially crafted SpEL expression (CVE-2022-22950)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link for the update. You must be logged in to download the update.
Affected Products
- Red Hat Openshift Application Runtimes Text-Only Advisories x86_64
Fixes
- BZ - 1975160 - CVE-2020-5404 reactor-netty: specific redirect configuration allows for a credentials leak
- BZ - 2034388 - CVE-2021-4178 kubernetes-client: Insecure deserialization in unmarshalYaml method
- BZ - 2039903 - CVE-2021-22569 protobuf-java: potential DoS in the parsing procedure for binary data
- BZ - 2069414 - CVE-2022-22950 spring-expression: Denial of service via specially crafted SpEL expression
- BZ - 2072339 - CVE-2022-1259 undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629)
- BZ - 2073890 - CVE-2022-1319 undertow: Double AJP response for 400 from EAP 7 results in CPING failures
References
- https://access.redhat.com/security/updates/classification/#moderate
- https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.spring.boot&version=2.7.2
- https://access.redhat.com/documentation/en-us/red_hat_support_for_spring_boot/2.7/html/release_notes_for_spring_boot_2.7/index
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.