Blame SOURCES/dhcp-4.2.5-reference_count_overflow.patch

fad460
diff --git a/common/options.c b/common/options.c
fad460
index 83e0384..a58c5fc 100644
fad460
--- a/common/options.c
fad460
+++ b/common/options.c
fad460
@@ -189,6 +189,8 @@ int parse_option_buffer (options, buffer, length, universe)
fad460
 
fad460
 		/* If the length is outrageous, the options are bad. */
fad460
 		if (offset + len > length) {
fad460
+			/* Avoid reference count overflow */
fad460
+			option_dereference(&option, MDL);
fad460
 			reason = "option length exceeds option buffer length";
fad460
 		      bogus:
fad460
 			log_error("parse_option_buffer: malformed option "