Unrated severityNVD Advisory· Published Jan 11, 2019· Updated Jun 9, 2025
CVE-2018-16864
CVE-2018-16864
Description
An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
Affected products
27- osv-coords26 versionspkg:apk/chainguard/py3.10-systemdpkg:apk/chainguard/py3.11-systemdpkg:apk/chainguard/py3.12-systemdpkg:apk/chainguard/py3.13-systemdpkg:apk/chainguard/py3-supported-systemdpkg:apk/chainguard/py3-systemdpkg:rpm/opensuse/systemd&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/systemd&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/systemd-mini&distro=openSUSE%20Leap%2015.0pkg:rpm/suse/systemd&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4pkg:rpm/suse/systemd&distro=SUSE%20OpenStack%20Cloud%207
< 0+ 25 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 234-lp150.20.12.1
- (no CPE)range: < 249.4-2.2
- (no CPE)range: < 234-lp150.20.12.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 234-24.20.1
- (no CPE)range: < 210-116.19.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 210-70.74.1
- (no CPE)range: < 210-116.19.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- The systemd Project/systemdv5Range: through v240
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
17- access.redhat.com/errata/RHBA-2019:0327mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:0049mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:0204mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:0271mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:0342mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:0361mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2402mitrevendor-advisoryx_refsource_REDHAT
- security.gentoo.org/glsa/201903-07mitrevendor-advisoryx_refsource_GENTOO
- usn.ubuntu.com/3855-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2019/dsa-4367mitrevendor-advisoryx_refsource_DEBIAN
- www.openwall.com/lists/oss-security/2021/07/20/2mitremailing-listx_refsource_MLIST
- www.securityfocus.com/bid/106523mitrevdb-entryx_refsource_BID
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2019/01/msg00016.htmlmitremailing-listx_refsource_MLIST
- security.netapp.com/advisory/ntap-20190117-0001/mitrex_refsource_CONFIRM
- www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlmitrex_refsource_MISC
- www.qualys.com/2019/01/09/system-down/system-down.txtmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.