CVE-2022-2928

NameCVE-2022-2928
DescriptionIn ISC DHCP 4.4.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option's refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3146-1, DSA-5251-1
Debian Bugs1021320

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
isc-dhcp (PTS)bullseye4.4.1-2.3+deb11u2fixed
bullseye (security)4.4.1-2.3+deb11u1fixed
bookworm4.4.3-P1-2fixed
trixie, sid4.4.3-P1-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
isc-dhcpsourcebuster4.4.1-2+deb10u2DLA-3146-1
isc-dhcpsourcebullseye4.4.1-2.3+deb11u1DSA-5251-1
isc-dhcpsource(unstable)4.4.3-2.11021320

Notes

https://www.openwall.com/lists/oss-security/2022/10/05/1
https://downloads.isc.org/isc/dhcp/4.4.3-P1/patches/
https://downloads.isc.org/isc/dhcp/4.1-ESV-R16-P2/patches/
https://kb.isc.org/docs/cve-2022-2928

Search for package or bug name: Reporting problems