CVE-2019-6454

Priority
Description
An issue was discovered in sd-bus in systemd 239. bus_process_object() in
libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer
for temporarily storing the object path of incoming D-Bus messages. An
unprivileged local user can exploit this by sending a specially crafted
message to PID1, causing the stack pointer to jump over the stack guard
pages into an unmapped memory region and trigger a denial of service
(systemd PID1 crash and kernel panic).
Assigned-to
chrisccoulson
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):released (229-4ubuntu21.16)
Ubuntu 18.04 LTS (Bionic Beaver):released (237-3ubuntu10.13)
Ubuntu 18.10 (Cosmic Cuttlefish):released (239-7ubuntu10.8)
Ubuntu 19.04 (Disco Dingo):pending (240-6ubuntu1)
More Information

Updated: 2019-03-21 02:14:26 UTC (commit 4ab68c52e64fb8069eb30ad125eaa59c21ae8843)