A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239. Reproducible: Always
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=9189edf61c8e135c0cd28be3534d7624cafff239 commit 9189edf61c8e135c0cd28be3534d7624cafff239 Author: Mike Gilbert <floppym@gentoo.org> AuthorDate: 2018-10-28 22:53:46 +0000 Commit: Mike Gilbert <floppym@gentoo.org> CommitDate: 2018-10-28 23:21:05 +0000 sys-apps/systemd: backport several patches for 239 Closes: https://bugs.gentoo.org/662776 Bug: https://bugs.gentoo.org/669664 Bug: https://bugs.gentoo.org/669716 Package-Manager: Portage-2.3.51_p2, Repoman-2.3.11_p27 Signed-off-by: Mike Gilbert <floppym@gentoo.org> sys-apps/systemd/Manifest | 1 + sys-apps/systemd/systemd-239-r2.ebuild | 448 +++++++++++++++++++++++++++++++++ 2 files changed, 449 insertions(+)
Added to an existing GLSA request.
This issue was resolved and addressed in GLSA 201810-10 at https://security.gentoo.org/glsa/201810-10 by GLSA coordinator Thomas Deutschmann (whissi).
Freeing CVE alias for tracker usage.