An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
31 Jan 2022, 18:34
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:* | |
References |
|
|
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/05/10/4 - Mailing List, Third Party Advisory |
Information
Published : 2019-01-11 21:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-16865
Mitre link : CVE-2018-16865
CVE.ORG link : CVE-2018-16865
JSON object : View
Products Affected
debian
- debian_linux
systemd_project
- systemd
redhat
- enterprise_linux_server_tus
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_server
- enterprise_linux_desktop
canonical
- ubuntu_linux
oracle
- enterprise_communications_broker
- communications_session_border_controller
CWE
CWE-770
Allocation of Resources Without Limits or Throttling