Headline
CVE-2019-6454: Debian -- Security Information -- DSA-4393-1 systemd
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
Debian Security Advisory
Date Reported:
18 Feb 2019
Affected Packages:
systemd
Vulnerable:
Yes
Security database references:
In Mitre’s CVE dictionary: CVE-2019-6454.
More information:
Chris Coulson discovered a flaw in systemd leading to denial of service. An unprivileged user could take advantage of this issue to crash PID1 by sending a specially crafted D-Bus message on the system bus.
For the stable distribution (stretch), this problem has been fixed in version 232-25+deb9u9.
We recommend that you upgrade your systemd packages.
For the detailed security status of systemd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/systemd