Description: "An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server." Disclosure: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 Bug: https://github.com/systemd/systemd/issues/16774
This issue was resolved and addressed in GLSA 202107-48 at https://security.gentoo.org/glsa/202107-48 by GLSA coordinator Sam James (sam_c).
All done.