An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Canonical
Subscribe
|
Ubuntu Linux
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Netapp
Subscribe
|
|
|
Redhat
Subscribe
|
Ansible Tower
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Compute Node Eus
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux For Ibm Z Systems \(structure A\)
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Power Big Endian
Subscribe
Enterprise Linux For Power Big Endian Eus
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux For Scientific Computing
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Server Update Services For Sap Solutions
Subscribe
Enterprise Linux Workstation
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Tus
Subscribe
|
|
Systemd Project
Subscribe
|
Systemd
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4367-1 | systemd security update |
EUVD |
EUVD-2018-8657 | An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable. |
Ubuntu USN |
USN-3855-1 | systemd vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 09 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-06-09T15:41:39.884Z
Reserved: 2018-09-11T00:00:00.000Z
Link: CVE-2018-16866
Updated: 2024-08-05T10:32:54.043Z
Status : Modified
Published: 2019-01-11T19:29:00.233
Modified: 2024-11-21T03:53:28.947
Link: CVE-2018-16866
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN