Unrated severityNVD Advisory· Published Jan 21, 2020· Updated Jun 9, 2025
CVE-2019-20386
CVE-2019-20386
Description
An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.
Affected products
22- systemd/systemddescription
- osv-coords21 versionspkg:apk/chainguard/py3.10-systemdpkg:apk/chainguard/py3.11-systemdpkg:apk/chainguard/py3.12-systemdpkg:apk/chainguard/py3.13-systemdpkg:apk/chainguard/py3-supported-systemdpkg:apk/chainguard/py3-systemdpkg:rpm/opensuse/systemd&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/systemd&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/systemd-mini&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4pkg:rpm/suse/systemd&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5
< 0+ 20 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 234-lp151.26.7.1
- (no CPE)range: < 249.4-2.2
- (no CPE)range: < 234-lp151.26.7.1
- (no CPE)range: < 234-24.39.1
- (no CPE)range: < 234-24.39.1
- (no CPE)range: < 234-24.39.1
- (no CPE)range: < 234-24.39.1
- (no CPE)range: < 228-150.86.3
- (no CPE)range: < 228-157.12.5
- (no CPE)range: < 234-24.39.1
- (no CPE)range: < 228-150.86.3
- (no CPE)range: < 228-157.12.5
- (no CPE)range: < 234-24.39.1
- (no CPE)range: < 228-150.86.3
- (no CPE)range: < 228-157.12.5
Patches
2efb536d0cbe2Update NEWS for v243
1 file changed · +12 −2
NEWS+12 −2 modified@@ -1,6 +1,6 @@ systemd System and Service Manager -CHANGES WITH 243 in spe: +CHANGES WITH 243: * This release enables unprivileged programs (i.e. requiring neither setuid nor file capabilities) to send ICMP Echo (i.e. ping) requests @@ -279,6 +279,16 @@ CHANGES WITH 243 in spe: been renamed to LinkLayerAddress=, and it now allows configuration of IP addresses, too. + * systemd-networkd's handling of the kernel's disable_ipv6 sysctl is + simplified: systemd-networkd will disable the sysctl (enable IPv6) if + IPv6 configuration (static or DHCPv6) was found for a given + interface. It will not touch the sysctl otherwise. + + * The order of entries is $PATH used by the user manager instance was + changed to put bin/ entries before the corresponding sbin/ entries. + It is recommended to not rely on this order, and only ever have one + binary with a given name in the system paths under /usr. + * A new tool systemd-network-generator has been added that may generate .network, .netdev and .link files from IP configuration specified on the kernel command line in the format used by Dracut. @@ -466,7 +476,7 @@ CHANGES WITH 243 in spe: Ruoyao, Yuri Chornoivan, Yu Watanabe, Your Name, Zach Smith, Zbigniew Jędrzejewski-Szmek, Zhang Xianwei - – Somewhere, SOME-TI-ME + – Camerino, 2019-09-03 CHANGES WITH 242:
b2774a3ae692bus_open leak sd_event_source when udevadm trigger。
1 file changed · +2 −1
src/login/logind-button.c+2 −1 modified@@ -341,7 +341,8 @@ int button_open(Button *b) { } (void) button_set_mask(b); - + + b->io_event_source = sd_event_source_unref(b->io_event_source); r = sd_event_add_io(b->manager->event, &b->io_event_source, b->fd, EPOLLIN, button_dispatch, b); if (r < 0) { log_error_errno(r, "Failed to add button event: %m");
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/mitrevendor-advisoryx_refsource_FEDORA
- usn.ubuntu.com/4269-1/mitrevendor-advisoryx_refsource_UBUNTU
- github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49admitrex_refsource_MISC
- security.netapp.com/advisory/ntap-20200210-0002/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.