{"id":"USN-3855-1","summary":"systemd vulnerabilities","details":"It was discovered that systemd-journald allocated variable-length buffers\nfor certain message fields on the stack. A local attacker could\npotentially exploit this to cause a denial of service, or execute\narbitrary code. (CVE-2018-16864)\n\nIt was discovered that systemd-journald allocated variable-length arrays\nof objects representing message fields on the stack. A local attacker\ncould potentially exploit this to cause a denial of service, or execute\narbitrary code. (CVE-2018-16865)\n\nAn out-of-bounds read was discovered in systemd-journald. A local\nattacker could potentially exploit this to obtain sensitive information\nand bypass ASLR protections. (CVE-2018-16866)\n","modified":"2026-02-10T04:41:28Z","published":"2019-01-11T14:08:50Z","related":["UBUNTU-CVE-2018-16864","UBUNTU-CVE-2018-16865","UBUNTU-CVE-2018-16866"],"upstream":["CVE-2018-16864","CVE-2018-16865","CVE-2018-16866","UBUNTU-CVE-2018-16864","UBUNTU-CVE-2018-16865","UBUNTU-CVE-2018-16866"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3855-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16864"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16865"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16866"}],"affected":[{"package":{"name":"systemd","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/systemd@229-4ubuntu21.15?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"229-4ubuntu21.15"}]}],"versions":["225-1ubuntu9","227-2ubuntu1","227-2ubuntu2","228-1ubuntu2","228-2ubuntu1","228-2ubuntu2","228-3ubuntu1","228-4ubuntu1","228-4ubuntu2","228-5ubuntu1","228-5ubuntu2","228-5ubuntu3","228-6ubuntu1","229-1ubuntu2","229-1ubuntu4","229-2ubuntu1","229-3ubuntu1","229-3ubuntu2","229-4ubuntu1","229-4ubuntu4","229-4ubuntu5","229-4ubuntu6","229-4ubuntu7","229-4ubuntu8","229-4ubuntu10","229-4ubuntu11","229-4ubuntu12","229-4ubuntu13","229-4ubuntu16","229-4ubuntu17","229-4ubuntu19","229-4ubuntu20","229-4ubuntu21","229-4ubuntu21.1","229-4ubuntu21.2","229-4ubuntu21.3","229-4ubuntu21.4","229-4ubuntu21.5","229-4ubuntu21.6","229-4ubuntu21.8","229-4ubuntu21.9","229-4ubuntu21.10"],"ecosystem_specific":{"binaries":[{"binary_name":"libnss-myhostname","binary_version":"229-4ubuntu21.15"},{"binary_name":"libnss-mymachines","binary_version":"229-4ubuntu21.15"},{"binary_name":"libnss-resolve","binary_version":"229-4ubuntu21.15"},{"binary_name":"libpam-systemd","binary_version":"229-4ubuntu21.15"},{"binary_name":"libsystemd-dev","binary_version":"229-4ubuntu21.15"},{"binary_name":"libsystemd0","binary_version":"229-4ubuntu21.15"},{"binary_name":"libudev-dev","binary_version":"229-4ubuntu21.15"},{"binary_name":"libudev1","binary_version":"229-4ubuntu21.15"},{"binary_name":"systemd","binary_version":"229-4ubuntu21.15"},{"binary_name":"systemd-container","binary_version":"229-4ubuntu21.15"},{"binary_name":"systemd-coredump","binary_version":"229-4ubuntu21.15"},{"binary_name":"systemd-journal-remote","binary_version":"229-4ubuntu21.15"},{"binary_name":"systemd-sysv","binary_version":"229-4ubuntu21.15"},{"binary_name":"udev","binary_version":"229-4ubuntu21.15"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2018-16864"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2018-16865"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-16866"}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3855-1.json"}},{"package":{"name":"systemd","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/systemd@237-3ubuntu10.11?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"237-3ubuntu10.11"}]}],"versions":["234-2ubuntu12","235-2ubuntu3","235-3ubuntu2","235-3ubuntu3","237-3ubuntu3","237-3ubuntu4","237-3ubuntu6","237-3ubuntu7","237-3ubuntu8","237-3ubuntu10","237-3ubuntu10.2","237-3ubuntu10.3","237-3ubuntu10.4","237-3ubuntu10.6","237-3ubuntu10.9"],"ecosystem_specific":{"binaries":[{"binary_name":"libnss-myhostname","binary_version":"237-3ubuntu10.11"},{"binary_name":"libnss-mymachines","binary_version":"237-3ubuntu10.11"},{"binary_name":"libnss-resolve","binary_version":"237-3ubuntu10.11"},{"binary_name":"libnss-systemd","binary_version":"237-3ubuntu10.11"},{"binary_name":"libpam-systemd","binary_version":"237-3ubuntu10.11"},{"binary_name":"libsystemd-dev","binary_version":"237-3ubuntu10.11"},{"binary_name":"libsystemd0","binary_version":"237-3ubuntu10.11"},{"binary_name":"libudev-dev","binary_version":"237-3ubuntu10.11"},{"binary_name":"libudev1","binary_version":"237-3ubuntu10.11"},{"binary_name":"systemd","binary_version":"237-3ubuntu10.11"},{"binary_name":"systemd-container","binary_version":"237-3ubuntu10.11"},{"binary_name":"systemd-coredump","binary_version":"237-3ubuntu10.11"},{"binary_name":"systemd-journal-remote","binary_version":"237-3ubuntu10.11"},{"binary_name":"systemd-sysv","binary_version":"237-3ubuntu10.11"},{"binary_name":"systemd-tests","binary_version":"237-3ubuntu10.11"},{"binary_name":"udev","binary_version":"237-3ubuntu10.11"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2018-16864"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2018-16865"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-16866"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3855-1.json"}}],"schema_version":"1.7.3"}