Out-of-bounds Read Affecting systemd-devel package, versions <0:219-67.el7
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-SYSTEMDDEVEL-1512616
- published 26 Jul 2021
- disclosed 9 Jan 2019
How to fix?
Upgrade RHEL:7 systemd-devel to version 0:219-67.el7 or higher.
This issue was patched in RHSA-2019:2091.
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd-devel package and not the systemd-devel package as distributed by RHEL.
See How to fix? for RHEL:7 relevant fixed versions and status.
An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
References
- http://www.securityfocus.com/bid/106527
- https://seclists.org/bugtraq/2019/May/25
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16866
- https://security.netapp.com/advisory/ntap-20190117-0001/
- https://access.redhat.com/security/cve/CVE-2018-16866
- https://www.debian.org/security/2019/dsa-4367
- http://seclists.org/fulldisclosure/2019/May/21
- https://security.gentoo.org/glsa/201903-07
- http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html
- https://www.qualys.com/2019/01/09/system-down/system-down.txt
- http://www.openwall.com/lists/oss-security/2019/05/10/4
- https://access.redhat.com/errata/RHSA-2019:2091
- https://usn.ubuntu.com/3855-1/
- https://access.redhat.com/errata/RHBA-2020:0547
- https://bugzilla.redhat.com/show_bug.cgi?id=1653867
CVSS Scores
version 3.1