U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2018-16866

Change History

Modified Analysis by NIST 2/20/2022 1:07:20 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_\(structure_a\):7_s390x:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Removed CVSS V3
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Changed Reference Type
http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html No Types Assigned
http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html Third Party Advisory, VDB Entry
Changed Reference Type
http://seclists.org/fulldisclosure/2019/May/21 No Types Assigned
http://seclists.org/fulldisclosure/2019/May/21 Mailing List, Third Party Advisory
Changed Reference Type
http://www.openwall.com/lists/oss-security/2019/05/10/4 No Types Assigned
http://www.openwall.com/lists/oss-security/2019/05/10/4 Mailing List, Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:2091 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:2091 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:3222 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:3222 Third Party Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2020:0593 No Types Assigned
https://access.redhat.com/errata/RHSA-2020:0593 Third Party Advisory
Changed Reference Type
https://seclists.org/bugtraq/2019/May/25 No Types Assigned
https://seclists.org/bugtraq/2019/May/25 Mailing List, Third Party Advisory