First published: Tue Nov 27 2018(Updated: )
A flaw was found in systemd-journald. An out-of-bounds read when parsing a crafted syslog message that could lead to information disclosure.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Systemd Project Systemd | >=221<=239 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Netapp Active Iq Performance Analytics Services | ||
Netapp Element Software | ||
Redhat Enterprise Linux | =7.6 | |
Redhat Enterprise Linux Compute Node Eus | =7.6 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux For Ibm Z Systems \(structure A\) | =7_s390x | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =7.6 | |
Redhat Enterprise Linux For Power Big Endian | =7.0 | |
Redhat Enterprise Linux For Power Big Endian Eus | =7.6 | |
Redhat Enterprise Linux For Power Little Endian | =7.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =7.6 | |
Redhat Enterprise Linux For Scientific Computing | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Aus | =7.6 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =7.4 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =7.6 | |
Redhat Enterprise Linux Server Tus | =7.4 | |
Redhat Enterprise Linux Server Tus | =7.6 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =7.4 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =7.6 | |
Redhat Enterprise Linux Workstation | =7.0 | |
ubuntu/systemd | <237-3ubuntu10.11 | 237-3ubuntu10.11 |
ubuntu/systemd | <239-7ubuntu10.6 | 239-7ubuntu10.6 |
ubuntu/systemd | <229-4ubuntu21.15 | 229-4ubuntu21.15 |
debian/systemd | 247.3-7+deb11u5 252.26-1~deb12u2 256.4-3 256.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16866 is a vulnerability found in systemd-journald that allows a local attacker to disclose process memory data by exploiting an out-of-bounds read when parsing log messages terminating with a colon.
Versions from v221 to v239 of systemd-journald, Debian Debian Linux 9.0, Canonical Ubuntu Linux 16.04, 18.04, and 18.10, Netapp Active Iq Performance Analytics Services, Netapp Element Software, and various versions of Redhat Enterprise Linux are affected.
CVE-2018-16866 has a severity rating of medium with a CVSS score of 3.3.
To fix CVE-2018-16866, you should apply the appropriate security patches provided by your operating system vendor or upgrade to a non-vulnerable version of systemd-journald.
You can find more information about CVE-2018-16866 on the MITRE CVE database (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866), Ubuntu security notices (https://ubuntu.com/security/notices/USN-3855-1), and NIST NVD (https://nvd.nist.gov/vuln/detail/CVE-2018-16866).