Name | CVE-2021-4213 |
Description | A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1014770 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
jss (PTS) | bullseye | 4.8.0-2 | vulnerable |
bookworm | 5.3.0-1 | fixed | |
sid, trixie | 5.5.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
jss | source | (unstable) | 5.2.0-1 | 1014770 |
[bullseye] - jss <no-dsa> (Minor issue)
[buster] - jss <no-dsa> (Minor issue)
[stretch] - jss <postponed> (revisit when/if fix is complete)
https://bugzilla.redhat.com/show_bug.cgi?id=2042900
https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448 (v5.2.0-beta1)
https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2 (v5.2.0-beta1)