Unrated severityNVD Advisory· Published Jan 11, 2019· Updated Jun 9, 2025
CVE-2018-16866
CVE-2018-16866
Description
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
Affected products
23- osv-coords22 versionspkg:apk/chainguard/py3.10-systemdpkg:apk/chainguard/py3.11-systemdpkg:apk/chainguard/py3.12-systemdpkg:apk/chainguard/py3.13-systemdpkg:apk/chainguard/py3-supported-systemdpkg:apk/chainguard/py3-systemdpkg:rpm/opensuse/systemd&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/systemd-mini&distro=openSUSE%20Leap%2015.0pkg:rpm/suse/systemd&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4pkg:rpm/suse/systemd&distro=SUSE%20OpenStack%20Cloud%207
< 0+ 21 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 234-lp150.20.12.1
- (no CPE)range: < 234-lp150.20.12.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 234-24.20.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- (no CPE)range: < 228-150.58.1
- The systemd Project/systemdv5Range: from v221 to v239
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- access.redhat.com/errata/RHSA-2019:2091mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:3222mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2020:0593mitrevendor-advisoryx_refsource_REDHAT
- security.gentoo.org/glsa/201903-07mitrevendor-advisoryx_refsource_GENTOO
- usn.ubuntu.com/3855-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2019/dsa-4367mitrevendor-advisoryx_refsource_DEBIAN
- packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.htmlmitrex_refsource_MISC
- seclists.org/fulldisclosure/2019/May/21mitremailing-listx_refsource_FULLDISC
- www.openwall.com/lists/oss-security/2019/05/10/4mitremailing-listx_refsource_MLIST
- www.securityfocus.com/bid/106527mitrevdb-entryx_refsource_BID
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- seclists.org/bugtraq/2019/May/25mitremailing-listx_refsource_BUGTRAQ
- security.netapp.com/advisory/ntap-20190117-0001/mitrex_refsource_CONFIRM
- www.qualys.com/2019/01/09/system-down/system-down.txtmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.