[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2019-1164 --- systemd

ID: oval:org.secpod.oval:def:1700139Date: (C)2019-06-19   (M)2023-12-20
Class: PATCHFamily: unix




It was found that bus_process_object in bus-objects.c allocates a buffer on the stack large enough to temporarily store the object path specified in the incoming message. A malicious unprivileged local user to send a message which results in the stack pointer moving outside of the bounds of the currently mapped stack region, jumping over the stack guard pages. A specifically crafted DBUS nessage could crash PID 1 and result in a subsequent kernel panic.

Platform:
Amazon Linux 2
Product:
systemd
Reference:
ALAS2-2019-1164
CVE-2019-6454
CVE    1
CVE-2019-6454
CPE    2
cpe:/a:ubuntu_developers:systemd
cpe:/o:amazon:linux:2

© SecPod Technologies