First published: Fri Sep 20 2024(Updated: )
The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next Central Manager | >=20.2.0<=20.2.1 | |
F5 BIG-IP Next | >=1.7.0<=1.9.2 | |
F5 BIG-IP Next | >=1.1.0<=1.3.1 | |
F5 F5OS-A | =1.7.0>=1.5.1<=1.5.2 | |
F5 F5OS-C | >=1.6.0<=1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000141024 is considered high due to the potential for an infinite loop.
To fix F5-K000141024, users should update to the fixed versions of the affected F5 products as specified in the advisory.
F5-K000141024 affects several products including BIG-IP Next Central Manager, BIG-IP Next SPK, BIG-IP Next CNF, F5OS-A, and F5OS-C within specific version ranges.
The impact of F5-K000141024 is that it can cause applications to become unresponsive due to an infinite loop during the JSON unmarshaling process.
Currently, there are no known workarounds for F5-K000141024; updating to the patched versions is recommended.