A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2021-4213 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2042900 | Issue Tracking Patch Third Party Advisory |
https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2 | Patch Third Party Advisory |
https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448 | Patch Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2021-4213 | Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2021-4213 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2042900 | Issue Tracking Patch Third Party Advisory |
https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2 | Patch Third Party Advisory |
https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448 | Patch Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2021-4213 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 06:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2021-4213 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2042900 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2 - Patch, Third Party Advisory | |
References | () https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448 - Patch, Third Party Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2021-4213 - Third Party Advisory |
Information
Published : 2022-08-24 16:15
Updated : 2024-11-21 06:37
NVD link : CVE-2021-4213
Mitre link : CVE-2021-4213
CVE.ORG link : CVE-2021-4213
JSON object : View
Products Affected
debian
- debian_linux
dogtagpki
- network_security_services_for_java
redhat
- enterprise_linux
CWE
CWE-401
Missing Release of Memory after Effective Lifetime