Name | CVE-2018-15688 |
Description | A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1580-1 |
Debian Bugs | 912008 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
network-manager (PTS) | bullseye | 1.30.6-1+deb11u1 | fixed |
| bookworm | 1.42.4-1 | fixed |
| sid, trixie | 1.48.10-1 | fixed |
systemd (PTS) | bullseye | 247.3-7+deb11u5 | fixed |
| bullseye (security) | 247.3-7+deb11u6 | fixed |
| bookworm | 252.30-1~deb12u2 | fixed |
| trixie | 256.5-1 | fixed |
| sid | 256.5-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[jessie] - network-manager <not-affected> (vulnerable code not present)
https://bugzilla.redhat.com/show_bug.cgi?id=1639067
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1795921
https://github.com/systemd/systemd/commit/49653743f69658aeeebdb14faf1ab158f1f2cb20
systemd-networkd not enabled by default in Debian
NetworkManager: https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=01ca2053bbea09f35b958c8cc7631e15469acb79