Bug 2147372 (CVE-2022-4132)

Summary: CVE-2022-4132 jss: Memory leak on TLS connections
Product: [Other] Security Response Reporter: Sage McTaggart <amctagga>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: alee, carnil, ckelley, coolsvap, csutherl, gzaronikas, huwang, ivan.afonichev, java-sig-commits, jclere, jwon, krzysztof.daniel, mfargett, mmadzin, mrehak, pdelbell, peholase, pjindal, psampaio, szappis
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: jss 5.5.0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-10-19 13:23:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2152893, 2152894, 2152896, 2157647, 2157648, 2240985    
Bug Blocks: 2147373    

Description Sage McTaggart 2022-11-23 20:23:01 UTC
An external upstream contributor has discovered a memory leak in JSS.
It requires non-standard configuration, but is a low-effort DoS vector if
configured that way (repeatedly hit the login page).
further information below in a forwarded email.

Comment 6 Patrick Del Bello 2023-01-02 13:10:15 UTC
Created tomcat tracking bugs for this issue:

Affects: epel-all [bug 2157647]
Affects: fedora-all [bug 2157648]

Comment 8 Salvatore Bonaccorso 2023-09-15 19:39:02 UTC
Is there more information on this issue? Is it reported upstream as well?

Comment 9 Marco Fargetta 2023-09-18 08:10:16 UTC
Hi Salvatore, this was related to an upstream JSS PR and the code has been already fixed in the latest releases.

Comment 10 Salvatore Bonaccorso 2023-09-22 10:00:57 UTC
Is it https://github.com/dogtagpki/jss/pull/842 ?

Comment 11 Marco Fargetta 2023-09-22 10:27:38 UTC
(In reply to Salvatore Bonaccorso from comment #10)
> Is it https://github.com/dogtagpki/jss/pull/842 ?

Upstream PR was

https://github.com/dogtagpki/jss/pull/970

This was triggered by the PR 

https://github.com/dogtagpki/jss/pull/928

Comment 12 Salvatore Bonaccorso 2023-09-22 11:22:23 UTC
Thank you!

Comment 13 Coty Sutherland 2023-09-22 13:37:45 UTC
Can we please correct the component that this CVE is reported against? All of the trackers filed against tomcat are closed as notabug or wontfix, but that's not an accurate status of the issue. There isn't a problem within tomcat, but rather the tomcatjss library. If it's actually an issue (there's limited information here...) the tomcatjss maintainer has likely already fixed it and we should be providing accurate information to our customers about it's status. Thanks!

Comment 14 Patrick Del Bello 2023-09-27 14:50:22 UTC
Created jss tracking bugs for this issue:

Affects: fedora-all [bug 2240985]