Bug 2132001 (CVE-2022-2929)
Summary: | CVE-2022-2929 dhcp: DHCP memory leak | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | bdettelb, caswilli, dffrench, gzaronik, Javier.Peinado, jburrell, jkoehler, jorton, kaycoth, mosvald, ngough, pavel, pemensik, rgodfrey, security-response-team, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | dhcp 4.4.3-P1, dhcp 4.1-ESV-R16-P2 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was found in the DHCP server where the "fqdn_universe_decode()" function allocates buffer space for the contents of option 81 (fqdn) data received in a DHCP packet. The maximum length of a DNS "label" is 63 bytes. The function tests the length byte of each label contained in the "fqdn"; if it finds a label whose length byte value is larger than 63, it returns without dereferencing the buffer space. This issue causes a memory leak. On a system with access to a DHCP server, an attacker from any adjacent network could send DHCP packets crafted to include "fqdn" labels longer than 63 bytes to the DHCP server, eventually causing the server to run out of memory and crash.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-05-16 16:52:47 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2132245, 2132246, 2132430 | ||
Bug Blocks: | 2131939 |
Description
TEJ RATHI
2022-10-04 12:39:43 UTC
Created dhcp tracking bugs for this issue: Affects: fedora-all [bug 2132430] This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2502 https://access.redhat.com/errata/RHSA-2023:2502 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:3000 https://access.redhat.com/errata/RHSA-2023:3000 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2929 |