Medium
Canonical Ubuntu
It was discovered that DHCP incorrectly handled option reference counting. A remote attacker could possibly use this issue to cause DHCP servers to crash, resulting in a denial of service. (CVE-2022-2928) It was discovered that DHCP incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause DHCP clients and servers to consume resources, leading to a denial of service. (CVE-2022-2929) Update Instructions: Run sudo pro fix USN-5658-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: isc-dhcp-relay – 4.3.5-3ubuntu7.4 isc-dhcp-client-ddns – 4.3.5-3ubuntu7.4 isc-dhcp-dev – 4.3.5-3ubuntu7.4 isc-dhcp-client – 4.3.5-3ubuntu7.4 isc-dhcp-common – 4.3.5-3ubuntu7.4 isc-dhcp-server – 4.3.5-3ubuntu7.4 isc-dhcp-server-ldap – 4.3.5-3ubuntu7.4 No subscription required
CVEs contained in this USN include: CVE-2022-2928, CVE-2022-2929.
Severity is medium unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
2022-12-07: Initial vulnerability report published.
CPE | Name | Operator | Version |
---|---|---|---|
bionic stemcells | lt | 1.115 | |
cflinuxfs3 | lt | 0.327.0 | |
jammy stemcells | lt | 1.30 | |
cf deployment | lt | 22.0.0 |