-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5251-1
security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso October 06, 2022
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : isc-dhcp
CVE ID : CVE-2022-2928 CVE-2022-2929
Debian Bug : 1021320
Several vulnerabilities have been discovered in the ISC DHCP client,
relay and server.
CVE-2022-2928
It was discovered that the DHCP server does not correctly perform
option reference counting when configured with "allow leasequery;".
A remote attacker can take advantage of this flaw to cause a denial
of service (daemon crash).
CVE-2022-2929
It was discovered that the DHCP server is prone to a memory leak
flaw when handling contents of option 81 (fqdn) data received in
a DHCP packet. A remote attacker can take advantage of this flaw
to cause DHCP servers to consume resources, resulting in denial
of service.
For the stable distribution (bullseye), these problems have been fixed in version 4.4.1-2.3+deb11u1.
We recommend that you upgrade your isc-dhcp packages.
For the detailed security status of isc-dhcp please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/isc-dhcp
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmM/JhpfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RH2w//csqQV6lFpngW++cdsH/kI7KfljC37qlP1fErkb9QdBTS+4s86U6sQ5tk zhFewe4PoB09QxR801US1yWHnjGdva42FdgeXDLDZoW/sYf6NJjcBqRsIzsFFNBm H2v3Wtsa4dSJpR9faNQW12YWN4dT0S9/DKnWnD30hdihq7DY1o7MOWukaDN9yVeD VEubO6cFunk0z/REuU0xr9BVur3grztHzEG3qTGTsJ4Y5+qAbgrqW4dgj2nW6s5U ErSPRethEBO2wAXWsriVv4KzucJWWBLnMlcpe/9+u0ogEhNJHOyjLE3a28X7RJmP uE3TJqvHper+/yIpu39eKvATgR+NAmdwLCMyd1XUj72WK4TfqnxUoVIlLYHj5DQp YaatMGBYRsCpTlXCSK2JpI0TcSXmAuQjQPU+fOyQ1pv8MxqBtwUn/YEIuxjJC/pH 3zccotE3vwtrPJFVWRx+LFhYVMumgeko4xXfcewNCqARnz2hS0ta4ZyA4T3j8jGP lfT+56IdlYzm9RO6QPnXbIxo3omh27omUHiRYOvsx0yCdtBaeYlHnS7fDlXLPZGz c7t2G8kps4rSTjHuVPAsvrQIsu+oIXGTaj1U3H1467B+P/7eKQmFvezQu3ZVM+ZZ N8sJUt9K95UiS0tbEx72EKDedoinrlaN8sc5jPowvqsekU1QjA8=
=KX/G
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)