Incorrect Calculation of Buffer Size Affecting systemd-devel package, versions <0:219-62.el7_6.2
Threat Intelligence
EPSS
0.31% (71st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-SYSTEMDDEVEL-4837413
- published 26 Jul 2021
- disclosed 26 Oct 2018
How to fix?
Upgrade RHEL:7 systemd-devel to version 0:219-62.el7_6.2 or higher.
This issue was patched in RHSA-2019:0049.
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-devel package and not the systemd-devel package as distributed by RHEL.
See How to fix? for RHEL:7 relevant fixed versions and status.
A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.
References
- http://www.securityfocus.com/bid/105745
- https://access.redhat.com/security/cve/CVE-2018-15688
- https://security.gentoo.org/glsa/201810-10
- https://github.com/systemd/systemd/pull/10518
- https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:0049
- https://usn.ubuntu.com/3806-1/
- https://usn.ubuntu.com/3807-1/
CVSS Scores
version 3.1