The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.
References
Configurations
History
21 Nov 2024, 02:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-2610.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2694.html - | |
References | () http://www.openwall.com/lists/oss-security/2016/09/28/9 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/09/30/1 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/93223 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1037320 - | |
References | () http://www.ubuntu.com/usn/USN-3094-1 - Third Party Advisory | |
References | () https://github.com/systemd/systemd/issues/4234 - Exploit, Patch, Third Party Advisory | |
References | () https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2016-10-13 14:59
Updated : 2024-11-21 02:58
NVD link : CVE-2016-7795
Mitre link : CVE-2016-7795
CVE.ORG link : CVE-2016-7795
JSON object : View
Products Affected
canonical
- ubuntu_linux
systemd_project
- systemd
CWE
CWE-20
Improper Input Validation