Lucene search

K
redhatcveRedhat.comRH:CVE-2022-2929
HistoryOct 05, 2022 - 2:57 p.m.

CVE-2022-2929

2022-10-0514:57:29
redhat.com
access.redhat.com
21

0.001 Low

EPSS

Percentile

41.0%

A vulnerability was found in the DHCP server where the “fqdn_universe_decode()” function allocates buffer space for the contents of option 81 (fqdn) data received in a DHCP packet. The maximum length of a DNS “label” is 63 bytes. The function tests the length byte of each label contained in the “fqdn”; if it finds a label whose length byte value is larger than 63, it returns without dereferencing the buffer space. This issue causes a memory leak. On a system with access to a DHCP server, an attacker from any adjacent network could send DHCP packets crafted to include “fqdn” labels longer than 63 bytes to the DHCP server, eventually causing the server to run out of memory and crash.

Mitigation

Possible workaround - As exploiting this vulnerability requires an attacker to send packets for an extended period of time, restarting servers periodically could be a viable workaround.