systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.
References
Configurations
Configuration 1 (hide)
|
History
15 Apr 2026, 16:44
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:* | |
| References | () https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a - Patch | |
| References | () https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6 - Patch | |
| References | () https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412 - Patch | |
| References | () https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd - Patch | |
| References | () https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f - Patch | |
| References | () https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f - Patch | |
| References | () https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69 - Patch | |
| References | () https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6 - Patch | |
| References | () https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c - Patch | |
| References | () https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8 - Patch | |
| References | () https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764 - Patch, Vendor Advisory | |
| First Time |
Systemd Project systemd
Systemd Project |
|
| CWE | NVD-CWE-noinfo |
23 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-23 22:16
Updated : 2026-04-15 16:44
NVD link : CVE-2026-29111
Mitre link : CVE-2026-29111
CVE.ORG link : CVE-2026-29111
JSON object : View
Products Affected
systemd_project
- systemd
CWE
