The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-2610.html | |
http://rhn.redhat.com/errata/RHSA-2016-2694.html | |
http://www.openwall.com/lists/oss-security/2016/09/28/9 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/09/30/1 | Third Party Advisory |
http://www.securityfocus.com/bid/93223 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037320 | |
http://www.ubuntu.com/usn/USN-3094-1 | Third Party Advisory |
https://github.com/systemd/systemd/issues/4234 | Exploit Patch Third Party Advisory |
https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet | Exploit Technical Description Third Party Advisory |
Configurations
History
No history.
Information
Published : 2016-10-13 14:59
Updated : 2024-02-04 18:53
NVD link : CVE-2016-7795
Mitre link : CVE-2016-7795
CVE.ORG link : CVE-2016-7795
JSON object : View
Products Affected
canonical
- ubuntu_linux
systemd_project
- systemd
CWE
CWE-20
Improper Input Validation