Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-16866

Опубликовано: 11 янв. 2019
Источник: ubuntu
Приоритет: medium
CVSS2: 2.1
CVSS3: 3.3

Описание

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

РелизСтатусПримечание
bionic

released

237-3ubuntu10.11
cosmic

released

239-7ubuntu10.6
devel

released

240-5ubuntu3
esm-infra-legacy/trusty

not-affected

code not built
esm-infra/bionic

released

237-3ubuntu10.11
esm-infra/xenial

released

229-4ubuntu21.15
precise/esm

DNE

trusty

not-affected

code not built
trusty/esm

not-affected

code not built
upstream

needs-triage

Показывать по

2.1 Low

CVSS2

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 4.3
redhat
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS3: 3.3
nvd
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS3: 3.3
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 3.3
debian
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it ...

CVSS3: 3.3
github
больше 3 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

2.1 Low

CVSS2

3.3 Low

CVSS3