Moderate: Red Hat support for Spring Boot 2.7.2 update

Related Vulnerabilities: CVE-2020-5404   CVE-2021-4178   CVE-2021-22569   CVE-2022-1259   CVE-2022-1319   CVE-2022-22950  

Synopsis

Moderate: Red Hat support for Spring Boot 2.7.2 update

Type/Severity

Security Advisory: Moderate

Topic

An update is now available for Red Hat OpenShift Application Runtimes.

Description

Red Hat support for Spring Boot provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.

This release of Red Hat support for Spring Boot 2.7.2 serves as a replacement for Red Hat support for Spring Boot 2.5.12, and includes security, bug fixes and enhancements. For more information, see the release notes listed in the References section.

Security Fix(es):

  • reactor-netty: specific redirect configuration allows for a credentials leak (CVE-2020-5404)
  • kubernetes-client: Insecure deserialization in unmarshalYaml method (CVE-2021-4178)
  • protobuf-java: potential DoS in the parsing procedure for binary data (CVE-2021-22569)
  • undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) (CVE-2022-1259)
  • undertow: Double AJP response for 400 from EAP 7 results in CPING failures (CVE-2022-1319)
  • spring-expression: Denial of service via specially crafted SpEL expression (CVE-2022-22950)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.

The References section of this erratum contains a download link for the update. You must be logged in to download the update.

Affected Products

  • Red Hat Openshift Application Runtimes Text-Only Advisories x86_64

Fixes

  • BZ - 1975160 - CVE-2020-5404 reactor-netty: specific redirect configuration allows for a credentials leak
  • BZ - 2034388 - CVE-2021-4178 kubernetes-client: Insecure deserialization in unmarshalYaml method
  • BZ - 2039903 - CVE-2021-22569 protobuf-java: potential DoS in the parsing procedure for binary data
  • BZ - 2069414 - CVE-2022-22950 spring-expression: Denial of service via specially crafted SpEL expression
  • BZ - 2072339 - CVE-2022-1259 undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629)
  • BZ - 2073890 - CVE-2022-1319 undertow: Double AJP response for 400 from EAP 7 results in CPING failures