First published: Thu Jan 17 2019(Updated: )
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/systemd | 247.3-7+deb11u5 247.3-7+deb11u6 252.31-1~deb12u1 257~rc3-1 257-1 | |
systemd | =239 | |
openSUSE | =15.0 | |
NetApp Active IQ | ||
Debian | =8.0 | |
Debian | =9.0 | |
Fedora | =29 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Compute Node EUS | =7.5 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.4 | |
redhat enterprise Linux eus | =7.5 | |
redhat enterprise Linux eus | =8.1 | |
redhat enterprise Linux eus | =8.2 | |
redhat enterprise Linux eus | =8.4 | |
redhat enterprise Linux for ibm z systems eus | =7.4 | |
redhat enterprise Linux for ibm z systems eus | =7.5 | |
redhat enterprise Linux for ibm z systems eus | =8.1 | |
redhat enterprise Linux for ibm z systems eus | =8.2 | |
redhat enterprise Linux for ibm z systems eus | =8.4 | |
redhat enterprise Linux for power big endian eus | =7.4 | |
redhat enterprise Linux for power little endian | =8.0 | |
redhat enterprise Linux for power little endian eus | =7.4 | |
redhat enterprise Linux for power little endian eus | =7.5 | |
redhat enterprise Linux for power little endian eus | =8.1 | |
redhat enterprise Linux for power little endian eus | =8.2 | |
redhat enterprise Linux for power little endian eus | =8.4 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server aus | =8.4 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =7.3 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =7.4 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =8.0 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =8.1 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =8.2 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.4 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server tus | =8.4 | |
redhat enterprise Linux server update services for sap solutions | =7.3 | |
redhat enterprise Linux server update services for sap solutions | =7.4 | |
redhat enterprise Linux server update services for sap solutions | =8.0 | |
redhat enterprise Linux server update services for sap solutions | =8.1 | |
redhat enterprise Linux server update services for sap solutions | =8.2 | |
redhat enterprise Linux workstation | =7.0 | |
McAfee Web Gateway | <7.7.2.21 | |
McAfee Web Gateway | >=7.8.0<7.8.2.8 | |
McAfee Web Gateway | >=8.0.0<8.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6454 has been classified as a high severity vulnerability.
To fix CVE-2019-6454, upgrade the systemd package to version 247.3-7+deb11u5 or higher.
CVE-2019-6454 affects systemd version 239 and its various distributions, including Debian, Ubuntu, and Red Hat.
An unprivileged local user can exploit CVE-2019-6454 to execute arbitrary code via crafted D-Bus messages.
No, CVE-2019-6454 requires local access to the system to exploit.