Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Upgrade to the patched release most closely related to your current version of ISC DHCP. These can all be downloaded from https://www.isc.org/downloads. 4.4.3-P1 4.1-ESV-R16-P2
Vendor Workaround
As exploiting this vulnerability requires an attacker to send packets for an extended period of time, restarting servers periodically could be a viable workaround.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3146-1 | isc-dhcp security update |
Debian DSA |
DSA-5251-1 | isc-dhcp security update |
EUVD |
EUVD-2022-35152 | In ISC DHCP 1.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1 a system with access to a DHCP server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually cause the server to run out of memory. |
Ubuntu USN |
USN-5658-1 | DHCP vulnerabilities |
Ubuntu USN |
USN-5658-2 | DHCP vulnerabilities |
Ubuntu USN |
USN-5658-3 | DHCP vulnerabilities |
No history.
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-16T18:28:37.665Z
Reserved: 2022-08-22T00:00:00.000Z
Link: CVE-2022-2929
No data.
Status : Modified
Published: 2022-10-07T05:15:11.320
Modified: 2024-11-21T07:01:56.337
Link: CVE-2022-2929
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN