Hide Forgot
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Versions of DHCP affected: 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Acknowledgments: Name: ISC Upstream: Felix Wilhelm (Google)
Public now via upstream advisory. External References: https://kb.isc.org/article/AA-01567
Created dhcp tracking bugs for this issue: Affects: fedora-all [bug 1550246]
Upstream commit: https://source.isc.org/cgi-bin/gitweb.cgi?p=dhcp.git;a=commitdiff;h=197b26f25309f947b97a83b8fdfc414b767798f8 Upstream bug (not public): https://bugs.isc.org/Public/Bug/Display.html?id=47140
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2018:0469 https://access.redhat.com/errata/RHSA-2018:0469
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:0483 https://access.redhat.com/errata/RHSA-2018:0483