Severity
3.3LOW
EPSS
0.1%
top 81.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 11
Latest updateMay 13

Description

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 1.8 | Impact: 1.4

Affected Packages7 packages

Debiansystemd< 240-1+3
NVDsystemd_project/systemd221239
CVEListV5the_systemd_project/systemdfrom v221 to v239

Also affects: Debian Linux 9.0, Ubuntu Linux 16.04, 18.04, 18.10, Enterprise Linux 7.6, 7, 7.0, 7.4

Patches

🔴Vulnerability Details

4
GHSA
GHSA-jr8q-jw7m-4m3m: An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'2022-05-13
CVEList
CVE-2018-16866: An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'2019-01-11
OSV
CVE-2018-16866: An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'2019-01-11
OSV
systemd vulnerabilities2019-01-11

📋Vendor Advisories

4
Ubuntu
systemd vulnerabilities2019-01-11
Red Hat
systemd: out-of-bounds read when parsing a crafted syslog message2019-01-09
Microsoft
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions2019-01-08
Debian
CVE-2018-16866: systemd - An out of bounds read was discovered in systemd-journald in the way it parses lo...2018

💬Community

2
Bugzilla
CVE-2018-16866 systemd: out-of-bounds read when parsing a crafted syslog message [fedora-all]2019-01-10
Bugzilla
CVE-2018-16866 systemd: out-of-bounds read when parsing a crafted syslog message2018-11-27