dhclient vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the dhclient package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Missing Authentication for Critical Function

*
  • H
Resource Exhaustion

<12:4.2.5-83.el7_9.2
  • H
Resource Exhaustion

<12:4.2.5-83.el7_9.2
  • H
Resource Exhaustion

<12:4.2.5-83.el7_9.2
  • M
Improper Input Validation

<12:4.2.5-77.el7
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • H
Out-of-Bounds

<12:4.2.5-83.el7_9.1
  • C
Arbitrary Command Injection

<12:4.2.5-68.el7_5.1
  • H
Resource Exhaustion

<12:4.2.5-83.el7_9.2
  • H
Resource Exhaustion

<12:4.2.5-83.el7_9.2
  • H
Resource Exhaustion

<12:4.2.5-83.el7_9.2
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Integer Overflow or Wraparound

*
  • C
Arbitrary Command Injection

<12:4.2.5-47.el7_3.1
  • C
Arbitrary Command Injection

<12:4.2.5-42.el7_2.1
  • C
Arbitrary Command Injection

<12:4.2.5-68.el7_5.1
  • C
Arbitrary Command Injection

<12:4.2.5-68.el7_5.1
  • C
Arbitrary Command Injection

<12:4.2.5-68.el7_5.1
  • C
Arbitrary Command Injection

<12:4.2.5-42.el7_2.1
  • C
Arbitrary Command Injection

<12:4.2.5-68.el7_5.1
  • C
Arbitrary Command Injection

<12:4.2.5-68.el7_5.1
  • C
Arbitrary Command Injection

<12:4.2.5-68.el7_5.1
  • C
Arbitrary Command Injection

<12:4.2.5-68.el7_5.1
  • C
Arbitrary Command Injection

<12:4.2.5-42.el7_2.1
  • C
Arbitrary Command Injection

<12:4.2.5-58.el7_4.4
  • C
Arbitrary Command Injection

<12:4.2.5-47.el7_3.1
  • C
Arbitrary Command Injection

<12:4.2.5-58.el7_4.4
  • C
Arbitrary Command Injection

<12:4.2.5-58.el7_4.4
  • C
Arbitrary Command Injection

<12:4.2.5-68.el7_5.1
  • C
Arbitrary Command Injection

<12:4.2.5-47.el7_3.1
  • C
Arbitrary Command Injection

<12:4.2.5-58.el7_4.4
  • C
Arbitrary Command Injection

<12:4.2.5-47.el7_3.1
  • C
Arbitrary Command Injection

<12:4.2.5-68.el7_5.1
  • C
Arbitrary Command Injection

<12:4.2.5-68.el7_5.1
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Integer Overflow or Wraparound

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.3
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • M
Missing Release of Resource after Effective Lifetime

<12:4.2.5-58.el7_4.1
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.5
  • H
Out-of-Bounds

<12:4.2.5-77.el7_7.1
  • H
Out-of-Bounds

<12:4.2.5-69.el7_6.1
  • H
Out-of-Bounds

<12:4.2.5-69.el7_6.1
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.5
  • H
Out-of-Bounds

<12:4.2.5-77.el7_7.1
  • H
Out-of-Bounds

<12:4.2.5-77.el7_7.1
  • H
Out-of-Bounds

<12:4.2.5-58.el7_4.5
  • H
Out-of-Bounds

<12:4.2.5-83.el7_9.1
  • H
Out-of-Bounds

<12:4.2.5-77.el7_7.1
  • H
Out-of-Bounds

<12:4.2.5-47.el7_3.2
  • H
Out-of-Bounds

<12:4.2.5-42.el7_2.2
  • H
Out-of-Bounds

<12:4.2.5-69.el7_6.1
  • M
Improper Input Validation

<12:4.2.5-77.el7
  • M
Improper Input Validation

<12:4.2.5-77.el7
  • M
Improper Input Validation

<12:4.2.5-77.el7
  • M
Improper Input Validation

<12:4.2.5-77.el7
  • M
Improper Input Validation

<12:4.2.5-77.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Resource Exhaustion

<12:4.2.5-47.el7
  • M
Integer Overflow or Wraparound

*