A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
This issue has been addressed in the following products: CEQ 2.2.1-1 (CVE-2022-22965) Via RHSA-2022:1306 https://access.redhat.com/errata/RHSA-2022:1306
This issue has been addressed in the following products: RHINT Camel-K 1.6.5 Via RHSA-2022:1333 https://access.redhat.com/errata/RHSA-2022:1333
This issue has been addressed in the following products: Red Hat Fuse 7.10.2 Via RHSA-2022:1360 https://access.redhat.com/errata/RHSA-2022:1360
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-22965
This issue has been addressed in the following products: RHPAM 7.12.1 async Via RHSA-2022:1378 https://access.redhat.com/errata/RHSA-2022:1378
This issue has been addressed in the following products: RHDM 7.12.1 async Via RHSA-2022:1379 https://access.redhat.com/errata/RHSA-2022:1379
This issue has been addressed in the following products: Red Hat AMQ 7.8.6 Via RHSA-2022:1626 https://access.redhat.com/errata/RHSA-2022:1626
This issue has been addressed in the following products: Red Hat AMQ 7.9.4 Via RHSA-2022:1627 https://access.redhat.com/errata/RHSA-2022:1627