A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2022-4132 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2147372 | Issue Tracking Patch |
https://access.redhat.com/security/cve/CVE-2022-4132 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2147372 | Issue Tracking Patch |
Configurations
History
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2022-4132 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2147372 - Issue Tracking, Patch |
05 Oct 2023, 17:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
|
CWE | CWE-401 | |
First Time |
Redhat enterprise Linux
Redhat Dogtagpki Dogtagpki network Security Services For Java |
|
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2147372 - Issue Tracking, Patch | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2022-4132 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
04 Oct 2023, 12:56
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-04 12:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-4132
Mitre link : CVE-2022-4132
CVE.ORG link : CVE-2022-4132
JSON object : View
Products Affected
redhat
- enterprise_linux
dogtagpki
- network_security_services_for_java
CWE
CWE-401
Missing Release of Memory after Effective Lifetime