First published: Thu Jun 04 2020(Updated: )
Red Hat support for Spring Boot provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.<br>This release of Red Hat support for Spring Boot 2.1.12 serves as a replacement for Red Hat support for Spring Boot 2.1.6, and includes security and bug fixes and enhancements. For further information, refer to the release notes linked to in the References section.<br>Security Fix(es):<br><li> tomcat: Apache Tomcat HTTP/2 DoS (CVE-2019-0199)</li> <li> keycloak: SAML broker does not check existence of signature on document allowing any user impersonation (CVE-2019-10201)</li> <li> keycloak: session hijack using the user access token (CVE-2019-3868)</li> <li> keycloak: missing signatures validation on CRL used to verify client certificates (CVE-2019-3875)</li> <li> keycloak: CSRF check missing in My Resources functionality in the Account Console (CVE-2019-10199)</li> <li> keycloak: cross-realm user access auth bypass (CVE-2019-14832)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
>=2.1.6<2.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:2366 is classified as important.
To fix RHSA-2020:2366, you need to update your Red Hat support for Spring Boot to the latest version.
RHSA-2020:2366 addresses multiple vulnerabilities related to Spring Boot that could impact application security.
RHSA-2020:2366 is applicable to users of Red Hat support for Spring Boot on OpenShift who are running affected versions.
RHSA-2020:2366 was released on August 11, 2020.