First published: Tue Nov 27 2018(Updated: )
A flaw was found in systemd-journald. A stack buffer overflow when passing several MB of arguments to a program calling syslog function. This can lead to a denial of service attack or arbitrary code execution in some cases.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/systemd | <=240-2<=204-1<=232-25+deb9u6 | 240-4 232-25+deb9u7 |
ubuntu/systemd | <237-3ubuntu10.11 | 237-3ubuntu10.11 |
ubuntu/systemd | <239-7ubuntu10.6 | 239-7ubuntu10.6 |
ubuntu/systemd | <229-4ubuntu21.15 | 229-4ubuntu21.15 |
debian/systemd | 247.3-7+deb11u5 252.26-1~deb12u2 256.4-3 256.5-1 | |
systemd | <=240 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server | =7.4 | |
redhat enterprise Linux server | =7.5 | |
redhat enterprise Linux server | =7.6 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Oracle Communications Session Border Controller | =8.0.0 | |
Oracle Communications Session Border Controller | =8.1.0 | |
Oracle Communications Session Border Controller | =8.2.0 | |
Oracle Enterprise Communications Broker | =3.0.0 | |
Oracle Enterprise Communications Broker | =3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16864 is a vulnerability found in systemd-journald that allows a local attacker to crash the service or escalate privileges.
CVE-2018-16864 has a severity rating of 7.8, which is considered high.
CVE-2018-16864 affects systemd versions up to and including 204-1, 232-25+deb9u6, and 240-2 on Debian. Other affected software versions can be found in the vulnerability details.
To fix CVE-2018-16864, you should update systemd to version 240-4 or 232-25+deb9u7 on Debian. For other affected software, refer to the recommended versions given in the vulnerability details.
You can find more information about CVE-2018-16864 at the following references: [link1], [link2], [link3].