-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5251-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso October 06, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : isc-dhcp CVE ID : CVE-2022-2928 CVE-2022-2929 Debian Bug : 1021320 Several vulnerabilities have been discovered in the ISC DHCP client, relay and server. CVE-2022-2928 It was discovered that the DHCP server does not correctly perform option reference counting when configured with "allow leasequery;". A remote attacker can take advantage of this flaw to cause a denial of service (daemon crash). CVE-2022-2929 It was discovered that the DHCP server is prone to a memory leak flaw when handling contents of option 81 (fqdn) data received in a DHCP packet. A remote attacker can take advantage of this flaw to cause DHCP servers to consume resources, resulting in denial of service. For the stable distribution (bullseye), these problems have been fixed in version 4.4.1-2.3+deb11u1. We recommend that you upgrade your isc-dhcp packages. For the detailed security status of isc-dhcp please refer to its security tracker page at: https://security-tracker.debian.org/tracker/isc-dhcp Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmM/JhpfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RH2w//csqQV6lFpngW++cdsH/kI7KfljC37qlP1fErkb9QdBTS+4s86U6sQ5tk zhFewe4PoB09QxR801US1yWHnjGdva42FdgeXDLDZoW/sYf6NJjcBqRsIzsFFNBm H2v3Wtsa4dSJpR9faNQW12YWN4dT0S9/DKnWnD30hdihq7DY1o7MOWukaDN9yVeD VEubO6cFunk0z/REuU0xr9BVur3grztHzEG3qTGTsJ4Y5+qAbgrqW4dgj2nW6s5U ErSPRethEBO2wAXWsriVv4KzucJWWBLnMlcpe/9+u0ogEhNJHOyjLE3a28X7RJmP uE3TJqvHper+/yIpu39eKvATgR+NAmdwLCMyd1XUj72WK4TfqnxUoVIlLYHj5DQp YaatMGBYRsCpTlXCSK2JpI0TcSXmAuQjQPU+fOyQ1pv8MxqBtwUn/YEIuxjJC/pH 3zccotE3vwtrPJFVWRx+LFhYVMumgeko4xXfcewNCqARnz2hS0ta4ZyA4T3j8jGP lfT+56IdlYzm9RO6QPnXbIxo3omh27omUHiRYOvsx0yCdtBaeYlHnS7fDlXLPZGz c7t2G8kps4rSTjHuVPAsvrQIsu+oIXGTaj1U3H1467B+P/7eKQmFvezQu3ZVM+ZZ N8sJUt9K95UiS0tbEx72EKDedoinrlaN8sc5jPowvqsekU1QjA8= =KX/G -----END PGP SIGNATURE-----