A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Network_security_services_for_java | Dogtagpki | * | 5.5.0 (excluding) |
Tomcat6 | Ubuntu | trusty | * |
Tomcat6 | Ubuntu | xenial | * |
Tomcat7 | Ubuntu | bionic | * |
Tomcat7 | Ubuntu | trusty | * |
Tomcat7 | Ubuntu | xenial | * |
Tomcat8 | Ubuntu | bionic | * |
Tomcat8 | Ubuntu | xenial | * |
Tomcat9 | Ubuntu | bionic | * |
Tomcat9 | Ubuntu | kinetic | * |
Tomcat9 | Ubuntu | lunar | * |
Tomcat9 | Ubuntu | mantic | * |