Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-29111

Опубликовано: 23 мар. 2026
Источник: redhat
CVSS3: 7.8

Описание

systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.

A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10NetworkManagerAffected
Red Hat Enterprise Linux 10rpm-ostreeAffected
Red Hat Enterprise Linux 10systemdAffected
Red Hat Enterprise Linux 7systemdAffected
Red Hat Enterprise Linux 8NetworkManagerAffected
Red Hat Enterprise Linux 8systemdAffected
Red Hat Enterprise Linux 9NetworkManagerAffected
Red Hat Enterprise Linux 9systemdAffected
Red Hat OpenShift Container Platform 4NetworkManagerAffected
Red Hat OpenShift Container Platform 4rhcosAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1287
https://bugzilla.redhat.com/show_bug.cgi?id=2450505systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 5.5
nvd
8 дней назад

systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.

msrc
5 дней назад

systemd: Local unprivileged user can trigger an assert

CVSS3: 5.5
debian
8 дней назад

systemd, a system and service manager, (as PID 1) hits an assert and f ...

7.8 High

CVSS3