An ni_dhcp4_parse_response memory leak in openSUSE wicked 0.6.55 and earlier allows network attackers to cause a denial of service by sending DHCP4 packets without a message type option.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00005.html | mailing list vendor advisory |
https://bugzilla.suse.com/show_bug.cgi?id=1160905 | issue tracking permissions required vendor advisory |