{"id":"CVE-2022-4132","details":"A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).","modified":"2026-04-11T12:41:01.269603Z","published":"2023-10-04T12:15:10.230Z","database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"9.0"}]}]},"references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2022-4132"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2147372"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dogtagpki/jss","events":[{"introduced":"0"},{"fixed":"959bb3ceb299ab1ab113b07c702178df090de5fe"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"5.5.0"}]}}],"versions":["JSS_4_4_20170313","JSS_4_4_20170328","JSS_4_4_20170501","JSS_4_4_3","NSS_3_14_2_BETA2","NSS_3_14_2_BETA3","NSS_3_14_2_RTM","NSS_3_14_3_BETA1","NSS_3_14_3_RC0","NSS_3_14_3_RTM","v4.4.3","v4.4.4","v4.5.0","v4.5.0-a1","v4.5.0-a2","v4.5.0-a3","v4.5.0-a4","v4.5.0-b1","v4.5.1","v4.5.2","v4.6.0","v4.6.1","v4.6.2","v4.6.3","v4.7.0","v4.7.0-b1","v4.7.0-b2","v4.7.0-b3","v4.7.0-b4","v4.7.1","v4.7.2","v4.8.0","v4.8.0-b1","v4.8.1","v4.9.0-alpha1","v5.0.0","v5.0.0-alpha1","v5.0.0-beta1","v5.1.0-alpha1","v5.1.0-alpha2","v5.2.0-beta1","v5.2.0-beta2","v5.3.0-beta1","v5.4.0","v5.4.0-alpha1","v5.5.0-alpha2","v5.5.0-alpha3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4132.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}