Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-40227

Опубликовано: 10 апр. 2026
Источник: redhat
CVSS3: 6.2
EPSS Низкий

Описание

A flaw was found in systemd. A local unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with a specially crafted array or map containing a null element. This can trigger an assert, leading to a Denial of Service (DoS) condition, which makes the system unavailable.

Отчет

A flaw in systemd allows a local unprivileged user to cause a Denial of Service by making a crafted Inter-Process Communication (IPC) API call. The issue is restricted to systemd v260 only, the systemd versions as shipped as with Red Hat products are not affected by this vulnerability as it doesn't ship the commit which introduced the vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10NetworkManagerNot affected
Red Hat Enterprise Linux 10rpm-ostreeNot affected
Red Hat Enterprise Linux 10systemdNot affected
Red Hat Enterprise Linux 7systemdNot affected
Red Hat Enterprise Linux 8NetworkManagerNot affected
Red Hat Enterprise Linux 8systemdNot affected
Red Hat Enterprise Linux 9NetworkManagerNot affected
Red Hat Enterprise Linux 9systemdNot affected
Red Hat Hardened ImagessystemdAffected
Red Hat OpenShift Container Platform 4NetworkManagerNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2457322systemd: systemd: Denial of Service via malicious IPC API call with null element

EPSS

Процентиль: 4%
0.00018
Низкий

6.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.2
ubuntu
2 дня назад

In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.

CVSS3: 6.2
nvd
5 дней назад

In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.

CVSS3: 6.2
debian
5 дней назад

In systemd 260 before 261, a local unprivileged user can trigger an as ...

CVSS3: 6.2
github
5 дней назад

In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.

EPSS

Процентиль: 4%
0.00018
Низкий

6.2 Medium

CVSS3