Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE.
References
Link | Resource |
---|---|
https://security.netapp.com/advisory/ntap-20220707-0003/ | Third Party Advisory |
https://tanzu.vmware.com/security/cve-2022-22976 | Mitigation Vendor Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220707-0003/ | Third Party Advisory |
https://tanzu.vmware.com/security/cve-2022-22976 | Mitigation Vendor Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2022-05-19 15:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-22976
Mitre link : CVE-2022-22976
CVE.ORG link : CVE-2022-22976
JSON object : View
Products Affected
vmware
- spring_security
netapp
- active_iq_unified_manager
oracle
- financial_services_crime_and_compliance_management_studio
CWE
CWE-190
Integer Overflow or Wraparound