Bug 2132001 (CVE-2022-2929)

Summary: CVE-2022-2929 dhcp: DHCP memory leak
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bdettelb, caswilli, dffrench, gzaronik, Javier.Peinado, jburrell, jkoehler, jorton, kaycoth, mosvald, ngough, pavel, pemensik, rgodfrey, security-response-team, vkumar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: dhcp 4.4.3-P1, dhcp 4.1-ESV-R16-P2 Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in the DHCP server where the "fqdn_universe_decode()" function allocates buffer space for the contents of option 81 (fqdn) data received in a DHCP packet. The maximum length of a DNS "label" is 63 bytes. The function tests the length byte of each label contained in the "fqdn"; if it finds a label whose length byte value is larger than 63, it returns without dereferencing the buffer space. This issue causes a memory leak. On a system with access to a DHCP server, an attacker from any adjacent network could send DHCP packets crafted to include "fqdn" labels longer than 63 bytes to the DHCP server, eventually causing the server to run out of memory and crash.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-16 16:52:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2132245, 2132246, 2132430    
Bug Blocks: 2131939    

Description TEJ RATHI 2022-10-04 12:39:43 UTC
A vulnerability was found in DHCP, where, a system with access to a DHCP server, sending DHCP packets crafted to include "fqdn" labels longer than 63 bytes, could eventually cause the server to run out of memory.

Versions affected:

- 1.0.0 -> 4.1-ESV-R16-P1
- 4.2.0 -> 4.4.3

Comment 5 Guilherme de Almeida Suckevicz 2022-10-05 16:36:17 UTC
Created dhcp tracking bugs for this issue:

Affects: fedora-all [bug 2132430]

Comment 7 errata-xmlrpc 2023-05-09 07:54:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2502 https://access.redhat.com/errata/RHSA-2023:2502

Comment 8 errata-xmlrpc 2023-05-16 08:41:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:3000 https://access.redhat.com/errata/RHSA-2023:3000

Comment 9 Product Security DevOps Team 2023-05-16 16:52:45 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-2929