A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2022-4132 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2147372 | Issue Tracking Patch |
https://access.redhat.com/security/cve/CVE-2022-4132 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2147372 | Issue Tracking Patch |
Configurations
History
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-04 12:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-4132
Mitre link : CVE-2022-4132
CVE.ORG link : CVE-2022-4132
JSON object : View
Products Affected
redhat
- enterprise_linux
dogtagpki
- network_security_services_for_java
CWE
CWE-401
Missing Release of Memory after Effective Lifetime