Felix Wilhelm discovered that the systemd-networkd DHCPv6 client incorrectly handled certain DHCPv6 messages. In configurations where systemd-networkd is being used, an attacker on the same network could use this issue to cause systemd-networkd to crash, resulting in a denial of service, or possibly execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "229-4ubuntu21.6", "binary_name": "libnss-myhostname" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "libnss-mymachines" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "libnss-resolve" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "libpam-systemd" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "libsystemd-dev" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "libsystemd0" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "libudev-dev" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "libudev1" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "systemd" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "systemd-container" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "systemd-coredump" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "systemd-journal-remote" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "systemd-sysv" }, { "binary_version": "229-4ubuntu21.6", "binary_name": "udev" } ] }
{ "ecosystem": "Ubuntu:16.04:LTS", "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2018-15688" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "237-3ubuntu10.4", "binary_name": "libnss-myhostname" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "libnss-mymachines" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "libnss-resolve" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "libnss-systemd" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "libpam-systemd" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "libsystemd-dev" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "libsystemd0" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "libudev-dev" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "libudev1" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "systemd" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "systemd-container" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "systemd-coredump" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "systemd-journal-remote" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "systemd-sysv" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "systemd-tests" }, { "binary_version": "237-3ubuntu10.4", "binary_name": "udev" } ] }
{ "ecosystem": "Ubuntu:18.04:LTS", "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2018-15688" } ] }