CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
10.1%
Debian Security Advisory DSA-4393-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
February 18, 2019 https://www.debian.org/security/faq
Package : systemd
CVE ID : CVE-2019-6454
Chris Coulson discovered a flaw in systemd leading to denial of service.
An unprivileged user could take advantage of this issue to crash PID1 by
sending a specially crafted D-Bus message on the system bus.
For the stable distribution (stretch), this problem has been fixed in
version 232-25+deb9u9.
We recommend that you upgrade your systemd packages.
For the detailed security status of systemd please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/systemd
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | armel | python3-systemd | < 215-17+deb8u10 | python3-systemd_215-17+deb8u10_armel.deb |
Debian | 8 | armel | systemd-dbg | < 215-17+deb8u10 | systemd-dbg_215-17+deb8u10_armel.deb |
Debian | 9 | armel | libudev-dev | < 232-25+deb9u9 | libudev-dev_232-25+deb9u9_armel.deb |
Debian | 9 | mipsel | libsystemd0 | < 232-25+deb9u9 | libsystemd0_232-25+deb9u9_mipsel.deb |
Debian | 9 | mips64el | libsystemd0-dbgsym | < 232-25+deb9u9 | libsystemd0-dbgsym_232-25+deb9u9_mips64el.deb |
Debian | 9 | mips64el | systemd-journal-remote-dbgsym | < 232-25+deb9u9 | systemd-journal-remote-dbgsym_232-25+deb9u9_mips64el.deb |
Debian | 9 | mipsel | udev-udeb | < 232-25+deb9u9 | udev-udeb_232-25+deb9u9_mipsel.deb |
Debian | 9 | mips | libudev1-udeb | < 232-25+deb9u9 | libudev1-udeb_232-25+deb9u9_mips.deb |
Debian | 9 | ppc64el | libsystemd-dev-dbgsym | < 232-25+deb9u9 | libsystemd-dev-dbgsym_232-25+deb9u9_ppc64el.deb |
Debian | 9 | ppc64el | systemd-coredump | < 232-25+deb9u9 | systemd-coredump_232-25+deb9u9_ppc64el.deb |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
10.1%