{"containers":{"cna":{"affected":[{"product":"JSS","vendor":"n/a","versions":[{"status":"affected","version":"Fixed in v5.2.0-beta1"}]}],"descriptions":[{"lang":"en","value":"A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-401","description":"CWE-401 - Missing Release of Memory after Effective Lifetime","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-08-24T15:07:48.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042900"},{"tags":["x_refsource_MISC"],"url":"https://access.redhat.com/security/cve/CVE-2021-4213"},{"tags":["x_refsource_MISC"],"url":"https://security-tracker.debian.org/tracker/CVE-2021-4213"},{"tags":["x_refsource_MISC"],"url":"https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448"},{"tags":["x_refsource_MISC"],"url":"https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2021-4213","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"JSS","version":{"version_data":[{"version_value":"Fixed in v5.2.0-beta1"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-401 - Missing Release of Memory after Effective Lifetime"}]}]},"references":{"reference_data":[{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=2042900","refsource":"MISC","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042900"},{"name":"https://access.redhat.com/security/cve/CVE-2021-4213","refsource":"MISC","url":"https://access.redhat.com/security/cve/CVE-2021-4213"},{"name":"https://security-tracker.debian.org/tracker/CVE-2021-4213","refsource":"MISC","url":"https://security-tracker.debian.org/tracker/CVE-2021-4213"},{"name":"https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448","refsource":"MISC","url":"https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448"},{"name":"https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2","refsource":"MISC","url":"https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:16:04.486Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042900"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://access.redhat.com/security/cve/CVE-2021-4213"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://security-tracker.debian.org/tracker/CVE-2021-4213"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/dogtagpki/jss/commit/3aabe0e9d59b0a42e68ac8cd0468f9c5179967d2"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2021-4213","datePublished":"2022-08-24T15:07:48.000Z","dateReserved":"2022-01-25T00:00:00.000Z","dateUpdated":"2024-08-03T17:16:04.486Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}