A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105745 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHBA-2019:0327 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3665 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:0049 | Third Party Advisory |
https://github.com/systemd/systemd/pull/10518 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201810-10 | Third Party Advisory |
https://usn.ubuntu.com/3806-1/ | Third Party Advisory |
https://usn.ubuntu.com/3807-1/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: canonical
Published: 2018-10-25T00:00:00
Updated: 2019-04-24T05:06:03
Reserved: 2018-08-22T00:00:00
Link: CVE-2018-15688
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-10-26T14:29:00.897
Modified: 2022-01-31T18:30:19.750
Link: CVE-2018-15688
JSON object: View
Redhat Information
No data.
CWE