CVE-2018-5732

Priority
Description
Failure to properly bounds-check a buffer used for processing DHCP options
allows a malicious server (or an entity masquerading as a server) to cause
a buffer overflow (and resulting crash) in dhclient by sending a response
containing a specially constructed options section. Affects ISC DHCP
versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):released (4.1.ESV-R4-0ubuntu5.13)
Ubuntu 14.04 ESM (Trusty Tahr):released (4.2.4-7ubuntu12.12)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.3.3-5ubuntu12.9)
Ubuntu 18.04 LTS (Bionic Beaver):released (4.3.5-3ubuntu5)
More Information

Updated: 2020-09-10 05:58:59 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)