5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
0.0004 Low
EPSS
Percentile
9.3%
Debian Security Advisory DSA-4393-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
February 18, 2019 https://www.debian.org/security/faq
Package : systemd
CVE ID : CVE-2019-6454
Chris Coulson discovered a flaw in systemd leading to denial of service.
An unprivileged user could take advantage of this issue to crash PID1 by
sending a specially crafted D-Bus message on the system bus.
For the stable distribution (stretch), this problem has been fixed in
version 232-25+deb9u9.
We recommend that you upgrade your systemd packages.
For the detailed security status of systemd please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/systemd
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | mips64el | libudev1-udeb | < 232-25+deb9u9 | libudev1-udeb_232-25+deb9u9_mips64el.deb |
Debian | 9 | ppc64el | systemd-coredump | < 232-25+deb9u9 | systemd-coredump_232-25+deb9u9_ppc64el.deb |
Debian | 9 | s390x | libpam-systemd | < 232-25+deb9u9 | libpam-systemd_232-25+deb9u9_s390x.deb |
Debian | 9 | mipsel | systemd-container-dbgsym | < 232-25+deb9u9 | systemd-container-dbgsym_232-25+deb9u9_mipsel.deb |
Debian | 8 | armel | gir1.2-gudev-1.0 | < 215-17+deb8u10 | gir1.2-gudev-1.0_215-17+deb8u10_armel.deb |
Debian | 8 | amd64 | libudev1-udeb | < 215-17+deb8u10 | libudev1-udeb_215-17+deb8u10_amd64.deb |
Debian | 8 | i386 | libsystemd-id128-dev | < 215-17+deb8u10 | libsystemd-id128-dev_215-17+deb8u10_i386.deb |
Debian | 9 | i386 | libnss-resolve-dbgsym | < 232-25+deb9u9 | libnss-resolve-dbgsym_232-25+deb9u9_i386.deb |
Debian | 9 | armhf | systemd-container-dbgsym | < 232-25+deb9u9 | systemd-container-dbgsym_232-25+deb9u9_armhf.deb |
Debian | 9 | armhf | libudev-dev | < 232-25+deb9u9 | libudev-dev_232-25+deb9u9_armhf.deb |
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
0.0004 Low
EPSS
Percentile
9.3%