Name | CVE-2019-6454 |
Description | An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1684-1, DSA-4393-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
systemd (PTS) | jessie, jessie (lts) | 215-17+deb8u15 | fixed |
| stretch (security) | 232-25+deb9u14 | fixed |
| stretch (lts), stretch | 232-25+deb9u17 | fixed |
| buster, buster (lts) | 241-7~deb10u11 | fixed |
| buster (security) | 241-7~deb10u10 | fixed |
| bullseye | 247.3-7+deb11u5 | fixed |
| bullseye (security) | 247.3-7+deb11u6 | fixed |
| bookworm | 252.31-1~deb12u1 | fixed |
| sid, trixie | 257~rc2-3 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://www.openwall.com/lists/oss-security/2019/02/18/3
https://github.com/systemd/systemd/commit/798ebaf9aea9b8ae3b8a0cc2702bc8de71acb3c6
https://github.com/systemd/systemd/commit/6d586a13717ae057aa1b4127400c3de61cd5b9e7
https://github.com/systemd/systemd/commit/f519a19bcd5afe674a9b8fc462cd77d8bad403c1
[wheezy] - systemd <not-affected> (Vulnerable code introduced later)