Описание
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 237-3ubuntu10.11 |
cosmic | released | 239-7ubuntu10.6 |
devel | released | 240-5ubuntu3 |
esm-infra-legacy/trusty | not-affected | code not built |
esm-infra/bionic | released | 237-3ubuntu10.11 |
esm-infra/xenial | released | 229-4ubuntu21.15 |
precise/esm | DNE | |
trusty | not-affected | code not built |
trusty/esm | not-affected | code not built |
upstream | needs-triage |
Показывать по
2.1 Low
CVSS2
3.3 Low
CVSS3
Связанные уязвимости
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
An out of bounds read was discovered in systemd-journald in the way it ...
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
2.1 Low
CVSS2
3.3 Low
CVSS3