{
  "threat_severity" : "Moderate",
  "public_date" : "2022-10-05T00:00:00Z",
  "bugzilla" : {
    "description" : "dhcp: DHCP memory leak",
    "id" : "2132001",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2132001"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "details" : [ "In ISC DHCP 1.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1 a system with access to a DHCP server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually cause the server to run out of memory.", "A vulnerability was found in the DHCP server where the \"fqdn_universe_decode()\" function allocates buffer space for the contents of option 81 (fqdn) data received in a DHCP packet. The maximum length of a DNS \"label\" is 63 bytes. The function tests the length byte of each label contained in the \"fqdn\"; if it finds a label whose length byte value is larger than 63, it returns without dereferencing the buffer space. This issue causes a memory leak. On a system with access to a DHCP server, an attacker from any adjacent network could send DHCP packets crafted to include \"fqdn\" labels longer than 63 bytes to the DHCP server, eventually causing the server to run out of memory and crash." ],
  "acknowledgement" : "Upstream acknowledges VictorV (Cyber Kunlun Lab) as the original reporter.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2023-05-16T00:00:00Z",
    "advisory" : "RHSA-2023:3000",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "dhcp-12:4.3.6-49.el8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2502",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "dhcp-12:4.4.2-18.b1.el9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "dhcp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "dhcp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-2929\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-2929\nhttps://kb.isc.org/docs/cve-2022-2929" ],
  "name" : "CVE-2022-2929",
  "mitigation" : {
    "value" : "Possible workaround - As exploiting this vulnerability requires an attacker to send packets for an extended period of time, restarting servers periodically could be a viable workaround.",
    "lang" : "en:us"
  },
  "csaw" : false
}