CVE-2022-22971

NameCVE-2022-22971
DescriptionIn spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libspring-java (PTS)jessie, jessie (lts)3.0.6.RELEASE-17+deb8u2vulnerable
stretch (security), stretch (lts), stretch4.3.5-1+deb9u1vulnerable
buster4.3.22-4vulnerable
bullseye4.3.30-1vulnerable
sid, trixie, bookworm4.3.30-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libspring-javasourcejessie(unfixed)end-of-life
libspring-javasource(unstable)(unfixed)unimportant

Notes

https://tanzu.vmware.com/security/cve-2022-22971
Only supported for building applications shipped in Debian, see README.Debian.security
[jessie] - libspring-java <end-of-life> (EOL'd for jessie)

Search for package or bug name: Reporting problems