-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat support for Spring Boot 2.7.2.SP1 security update
Advisory ID:       RHSA-2023:0272-01
Product:           Red Hat OpenShift Application Runtimes
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:0272
Issue date:        2023-02-06
CVE Names:         CVE-2022-23181 
====================================================================
1. Summary:

An update is now available for Red Hat OpenShift Application Runtimes.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat support for Spring Boot provides an application platform that
reduces the complexity of developing and operating applications (monoliths
and microservices) for OpenShift as a containerized platform.

This release of Red Hat support for Spring Boot 2.7.2.SP1 serves as a
replacement for Red Hat support for Spring Boot 2.7.2, and includes
security, bug fixes, and enhancements. For more information, see the
release notes linked to in the References section.

Security Fix(es):

* tomcat: local privilege escalation vulnerability (CVE-2022-23181)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

The References section of this erratum contains a download link for the
update. You must be logged in to download the update.

4. Bugs fixed (https://bugzilla.redhat.com/):

2047417 - CVE-2022-23181 tomcat: local privilege escalation vulnerability

5. References:

https://access.redhat.com/security/cve/CVE-2022-23181
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.spring.boot&version=2.7.2.SP1
https://access.redhat.com/documentation/en-us/red_hat_support_for_spring_boot/2.7/html/release_notes_for_spring_boot_2.7/index

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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VP/1
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-0272:01 Moderate: Red Hat support for Spring Boot

An update is now available for Red Hat OpenShift Application Runtimes

Summary

Red Hat support for Spring Boot provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.
This release of Red Hat support for Spring Boot 2.7.2.SP1 serves as a replacement for Red Hat support for Spring Boot 2.7.2, and includes security, bug fixes, and enhancements. For more information, see the release notes linked to in the References section.
Security Fix(es):
* tomcat: local privilege escalation vulnerability (CVE-2022-23181)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link for the update. You must be logged in to download the update.

References

https://access.redhat.com/security/cve/CVE-2022-23181 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.spring.boot&version=2.7.2.SP1 https://access.redhat.com/documentation/en-us/red_hat_support_for_spring_boot/2.7/html/release_notes_for_spring_boot_2.7/index

Package List


Severity
Advisory ID: RHSA-2023:0272-01
Product: Red Hat OpenShift Application Runtimes
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0272
Issued Date: : 2023-02-06
CVE Names: CVE-2022-23181

Topic

An update is now available for Red Hat OpenShift Application Runtimes.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2047417 - CVE-2022-23181 tomcat: local privilege escalation vulnerability


Related News