It was discovered that if option decoding fails, the fr_dhcp_decode() function would leak memory. The security impact is denial of service via memory exhaustion by any network device capable of sending DHCP packets to FreeRADIUS, which sends packets with malformed options. Affected versions: 2.0.0 through 2.2.9, inclusive.
Acknowledgments: Name: the FreeRADIUS project Upstream: Guido Vranken
Created attachment 1295278 [details] Proposed patch
Created freeradius tracking bugs for this issue: Affects: fedora-all [bug 1471853]
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:1759 https://access.redhat.com/errata/RHSA-2017:1759
External References: http://freeradius.org/security/fuzzer-2017.html