Описание
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 237-3ubuntu10.11 |
| cosmic | released | 239-7ubuntu10.6 |
| devel | released | 240-5ubuntu3 |
| esm-infra-legacy/trusty | not-affected | code not built |
| esm-infra/bionic | released | 237-3ubuntu10.11 |
| esm-infra/xenial | released | 229-4ubuntu21.15 |
| precise/esm | DNE | |
| trusty | not-affected | code not built |
| trusty/esm | not-affected | code not built |
| upstream | needs-triage |
Показывать по
2.1 Low
CVSS2
3.3 Low
CVSS3
Связанные уязвимости
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
An out of bounds read was discovered in systemd-journald in the way it ...
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
2.1 Low
CVSS2
3.3 Low
CVSS3