First published: Thu May 03 2018(Updated: )
Red Hat Openshift Application Runtimes provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.<br>This release of RHOAR Spring Boot 1.5.12 serves as a replacement for RHOAR Spring Boot 1.5.10, and includes bug fixes and enhancements. For further information, refer to the Release Notes linked to in the References section.<br>Security Fix(es):<br><li> spring-framework: Address partial fix for CVE-2018-1270 (CVE-2018-1275)</li> <li> spring-framework: Directory traversal vulnerability with static resources on Windows filesystems (CVE-2018-1271)</li> <li> tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304)</li> <li> tomcat: Late application of security constraints can lead to resource exposure for unauthorised users (CVE-2018-1305)</li> <li> spring-framework: Multipart content pollution (CVE-2018-1272)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Application Runtimes | >=1.5.10<=1.5.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2018:1320 is classified as moderate.
To fix RHSA-2018:1320, update the affected packages to the latest version provided by Red Hat.
RHSA-2018:1320 affects specific versions of Red Hat Openshift Application Runtimes and Spring Boot.
Yes, RHSA-2018:1320 addresses security vulnerabilities found in the affected software.
Failing to address RHSA-2018:1320 may expose systems to potential security risks and operational issues.