Generated remediation guidance and an executive summary. No account required.
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
Cite this page
CVE-2019-6454. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2019-6454
Use CWE-787, Systemd Project vendor hub and Systemd product page to widen CVE-2019-6454 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-40224, CVE-2026-40226 and CVE-2026-40225 for nearby disclosures in the same product family.