DEBIAN-CVE-2021-4213

Source
https://security-tracker.debian.org/tracker/CVE-2021-4213
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-4213.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2021-4213
Upstream
Published
2022-08-24T16:15:09.980Z
Modified
2025-11-20T10:15:10.812758Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.

References

Affected packages

Debian:11 / jss

Package

Name
jss
Purl
pkg:deb/debian/jss?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.8.0-2
4.9.1-1

5.*

5.0.0-1
5.1.0-1
5.2.0-1
5.3.0-1
5.4.0-1
5.4.2-1
5.5.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / jss

Package

Name
jss
Purl
pkg:deb/debian/jss?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.2.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}