CVE-2022-4132

A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).
Configurations

Configuration 1 (hide)

cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2022-4132 - Third Party Advisory () https://access.redhat.com/security/cve/CVE-2022-4132 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2147372 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=2147372 - Issue Tracking, Patch

05 Oct 2023, 17:03

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
CWE CWE-401
First Time Redhat enterprise Linux
Redhat
Dogtagpki
Dogtagpki network Security Services For Java
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2147372 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2147372 - Issue Tracking, Patch
References (MISC) https://access.redhat.com/security/cve/CVE-2022-4132 - (MISC) https://access.redhat.com/security/cve/CVE-2022-4132 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9

04 Oct 2023, 12:56

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-04 12:15

Updated : 2024-11-21 07:34


NVD link : CVE-2022-4132

Mitre link : CVE-2022-4132

CVE.ORG link : CVE-2022-4132


JSON object : View

Products Affected

redhat

  • enterprise_linux

dogtagpki

  • network_security_services_for_java
CWE
CWE-401

Missing Release of Memory after Effective Lifetime