Description
barebox prior to version 2026.04.0 contains an out-of-bounds read vulnerability in DHCP option parsing within the dhcp_message_type() function that fails to verify the options pointer remains within received packet bounds. An attacker on the same broadcast domain can send a crafted DHCP Offer or ACK packet without a proper 0xff end marker to cause the parser to read past valid packet data and potentially crash the system.
Problem types
Product status
Any version
Credits
Kazuma Matsumoto
References
github.com/barebox/barebox
github.com/barebox/barebox/releases/tag/v2026.04.0
www.vulncheck.com/...t-of-bounds-read-in-dhcp-option-parsing