An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1639-1 | systemd security update |
Debian DSA |
DSA-4367-1 | systemd security update |
EUVD |
EUVD-2018-8656 | An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable. |
Ubuntu USN |
USN-3855-1 | systemd vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 09 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-06-09T15:51:35.108Z
Reserved: 2018-09-11T00:00:00.000Z
Link: CVE-2018-16865
Updated: 2024-08-05T10:32:54.176Z
Status : Modified
Published: 2019-01-11T21:29:00.257
Modified: 2024-11-21T03:53:28.770
Link: CVE-2018-16865
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN