CVE-2019-6454

An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 37%
VendorProductVersion
opensuseleap
15.0
netappactive_iq_performance_analytics_services
-
debiandebian_linux
8.0
debiandebian_linux
9.0
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
18.10
redhatenterprise_linux
8.0
redhatenterprise_linux_compute_node_eus
7.5
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_eus
7.4
redhatenterprise_linux_eus
7.5
redhatenterprise_linux_eus
8.1
redhatenterprise_linux_eus
8.2
redhatenterprise_linux_eus
8.4
redhatenterprise_linux_for_ibm_z_systems_eus
7.4
redhatenterprise_linux_for_ibm_z_systems_eus
7.5
redhatenterprise_linux_for_ibm_z_systems_eus
8.1
redhatenterprise_linux_for_ibm_z_systems_eus
8.2
redhatenterprise_linux_for_ibm_z_systems_eus
8.4
redhatenterprise_linux_for_power_big_endian_eus
7.4
redhatenterprise_linux_for_power_little_endian
8.0
redhatenterprise_linux_for_power_little_endian_eus
7.4
redhatenterprise_linux_for_power_little_endian_eus
7.5
redhatenterprise_linux_for_power_little_endian_eus
8.1
redhatenterprise_linux_for_power_little_endian_eus
8.2
redhatenterprise_linux_for_power_little_endian_eus
8.4
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.3
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_aus
7.6
redhatenterprise_linux_server_aus
8.2
redhatenterprise_linux_server_aus
8.4
redhatenterprise_linux_server_eus
7.6
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
7.3
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
7.4
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.0
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.1
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.2
redhatenterprise_linux_server_tus
7.3
redhatenterprise_linux_server_tus
7.4
redhatenterprise_linux_server_tus
7.6
redhatenterprise_linux_server_tus
8.2
redhatenterprise_linux_server_tus
8.4
redhatenterprise_linux_server_update_services_for_sap_solutions
7.3
redhatenterprise_linux_server_update_services_for_sap_solutions
7.4
redhatenterprise_linux_server_update_services_for_sap_solutions
8.0
redhatenterprise_linux_server_update_services_for_sap_solutions
8.1
redhatenterprise_linux_server_update_services_for_sap_solutions
8.2
redhatenterprise_linux_workstation
7.0
mcafeeweb_gateway
𝑥
< 7.7.2.21
mcafeeweb_gateway
7.8.0 ≤
𝑥
< 7.8.2.8
mcafeeweb_gateway
8.0.0 ≤
𝑥
< 8.1.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
systemd
bullseye
247.3-7+deb11u5
fixed
bullseye (security)
247.3-7+deb11u6
fixed
bookworm
252.30-1~deb12u2
fixed
sid
256.7-3
fixed
trixie
256.7-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
systemd
cosmic
Fixed 239-7ubuntu10.8
released
bionic
Fixed 237-3ubuntu10.13
released
xenial
Fixed 229-4ubuntu21.16
released
trusty
not-affected
References