The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.
References
Link | Resource |
---|---|
http://www.ubuntu.com/usn/USN-3094-1 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/09/30/1 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/09/28/9 | Third Party Advisory |
https://github.com/systemd/systemd/issues/4234 | Exploit Patch Third Party Advisory |
https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet | Exploit Technical Description Third Party Advisory |
http://www.securityfocus.com/bid/93223 | Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2016-2694.html | |
http://rhn.redhat.com/errata/RHSA-2016-2610.html | |
http://www.securitytracker.com/id/1037320 |
Information
Published : 2016-10-13 07:59
Updated : 2017-07-27 18:29
NVD link : CVE-2016-7795
Mitre link : CVE-2016-7795
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
canonical
- ubuntu_linux
systemd_project
- systemd