Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE.
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Link | Tags |
---|---|
https://tanzu.vmware.com/security/cve-2022-22976 | mitigation vendor advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |
https://security.netapp.com/advisory/ntap-20220707-0003/ | third party advisory |