Failure to properly bounds check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Versions of DHCP affected: 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Acknowledgments: Name: ISC Upstream: Felix Wilhelm (Google)
Public now via upstream advisory. External References: https://kb.isc.org/article/AA-01565
Created dhcp tracking bugs for this issue: Affects: fedora-all [bug 1550246]
Upstream commit: https://source.isc.org/cgi-bin/gitweb.cgi?p=dhcp.git;a=commitdiff;h=c5931725b48b121d232df4ba9e45bc41e0ba114d Upstream bug (not public): https://bugs.isc.org/Public/Bug/Display.html?id=47139
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2018:0469 https://access.redhat.com/errata/RHSA-2018:0469
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:0483 https://access.redhat.com/errata/RHSA-2018:0483