You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Note:Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.
An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
Remediation
Upgrade Debian:9systemd to version 232-25+deb9u7 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream
systemd
package and not thesystemd
package as distributed byDebian
.See
How to fix?
forDebian:9
relevant fixed versions and status.An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
Remediation
Upgrade
Debian:9
systemd
to version 232-25+deb9u7 or higher.References
The text was updated successfully, but these errors were encountered: