First published: Thu Jan 20 2022(Updated: )
A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dogtagpki Network Security Services For Java | <4.9.3 | |
Dogtagpki Network Security Services For Java | >=5.0.0<5.1.0 | |
Redhat Enterprise Linux | =8.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
redhat/jss | <5.1.0 | 5.1.0 |
redhat/jss | <4.9.3 | 4.9.3 |
debian/jss | <=4.8.0-2 | 5.3.0-1 5.5.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2021-4213.
The severity of CVE-2021-4213 is high (7.5).
This flaw allows an attacker to cause a denial of service by forcing the invocation of an out-of-memory process, which can saturate the server's RAM.
The affected software versions include Dogtagpki Network Security Services for Java up to version 4.9.3, and versions between 5.0.0 and 5.1.0. Redhat Enterprise Linux 8.0, Debian Debian Linux 10.0, and Debian Debian Linux 11.0 are also affected.
To fix CVE-2021-4213, update the affected software to version 5.1.0 for Redhat systems or follow the available remedies for other distributions.