First published: Thu Jan 17 2019(Updated: )
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/systemd | 247.3-7+deb11u5 247.3-7+deb11u6 252.31-1~deb12u1 257~rc3-1 257-1 | |
systemd | =239 | |
SUSE Linux | =15.0 | |
NetApp Active IQ | ||
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Red Hat Fedora | =29 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Compute Node EUS | =7.5 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux Server EUS | =8.1 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =7.4 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =7.5 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.1 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.2 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.4 | |
Red Hat Enterprise Linux for Power, Big Endian EUS | =7.4 | |
Red Hat Enterprise Linux for Power, little endian | =8.0 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =7.4 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =7.5 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.1 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.2 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.4 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =7.3 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =7.4 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.0 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.1 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.2 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =7.3 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =7.4 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.0 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.1 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.2 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
McAfee Web Gateway Cloud Service | <7.7.2.21 | |
McAfee Web Gateway Cloud Service | >=7.8.0<7.8.2.8 | |
McAfee Web Gateway Cloud Service | >=8.0.0<8.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6454 has been classified as a high severity vulnerability.
To fix CVE-2019-6454, upgrade the systemd package to version 247.3-7+deb11u5 or higher.
CVE-2019-6454 affects systemd version 239 and its various distributions, including Debian, Ubuntu, and Red Hat.
An unprivileged local user can exploit CVE-2019-6454 to execute arbitrary code via crafted D-Bus messages.
No, CVE-2019-6454 requires local access to the system to exploit.