Search CVE reports


Toggle filters

21 – 30 of 52 results


CVE-2019-3815

Medium priority
Not affected

A memory leak was discovered in the backport of fixes for CVE-2018-16864 in Red Hat Enterprise Linux. Function dispatch_message_real() in journald-server.c does not free the memory allocated by set_iovec_field_free() to store the...

1 affected package

systemd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
systemd Not affected
Show less packages

CVE-2019-20386

Low priority

Some fixes available 3 of 5

An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.

1 affected package

systemd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
systemd Not affected Not affected Not affected Fixed
Show less packages

CVE-2019-15718

Medium priority
Fixed

In systemd 240, bus_open_system_watch_bind_with_description in shared/bus-util.c (as used by systemd-resolved to connect to the system D-Bus instance), calls sd_bus_set_trusted, which disables access controls for incoming D-Bus...

1 affected package

systemd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
systemd Fixed
Show less packages

CVE-2018-6954

Medium priority

Some fixes available 3 of 4

systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under...

1 affected package

systemd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
systemd Fixed
Show less packages

CVE-2018-21029

Low priority
Ignored

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been...

1 affected package

systemd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
systemd Not affected
Show less packages

CVE-2018-20839

Medium priority
Ignored

systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka...

1 affected package

systemd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
systemd Not affected Not affected Not affected
Show less packages

CVE-2018-16888

Low priority
Fixed

It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is...

1 affected package

systemd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
systemd Not affected
Show less packages

CVE-2018-16866

Medium priority
Fixed

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

1 affected package

systemd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
systemd Fixed
Show less packages

CVE-2018-16865

High priority
Fixed

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if...

1 affected package

systemd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
systemd Fixed
Show less packages

CVE-2018-16864

High priority
Fixed

An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use...

1 affected package

systemd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
systemd Fixed
Show less packages