Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-40227 (GCVE-0-2026-40227)
Vulnerability from cvelistv5 – Published: 2026-04-10 15:19 – Updated: 2026-04-14 14:49- CWE-1025 - Comparison Using Wrong Factors
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-40227",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-14T14:49:13.131629Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-14T14:49:32.971Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "systemd",
"vendor": "systemd",
"versions": [
{
"lessThan": "261",
"status": "affected",
"version": "260",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1025",
"description": "CWE-1025 Comparison Using Wrong Factors",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-10T15:26:26.507Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq"
}
],
"x_generator": {
"engine": "CVE-Request-form 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2026-40227",
"datePublished": "2026-04-10T15:19:51.433Z",
"dateReserved": "2026-04-10T15:19:51.012Z",
"dateUpdated": "2026-04-14T14:49:32.971Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-40227",
"date": "2026-05-04",
"epss": "0.0002",
"percentile": "0.05373"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-40227\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2026-04-10T16:16:33.607\",\"lastModified\":\"2026-04-14T19:41:59.977\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.2,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"cve@mitre.org\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1025\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:260:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC53AC2-A12C-42A6-9165-E780FD9DC42D\"}]}]}],\"references\":[{\"url\":\"https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-40227\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-14T14:49:13.131629Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-14T14:49:27.413Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.2, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"systemd\", \"product\": \"systemd\", \"versions\": [{\"status\": \"affected\", \"version\": \"260\", \"lessThan\": \"261\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq\"}], \"x_generator\": {\"engine\": \"CVE-Request-form 0.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1025\", \"description\": \"CWE-1025 Comparison Using Wrong Factors\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2026-04-10T15:26:26.507Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-40227\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-14T14:49:32.971Z\", \"dateReserved\": \"2026-04-10T15:19:51.012Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2026-04-10T15:19:51.433Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:7299
Vulnerability from csaf_redhat - Published: 2026-04-09 11:44 - Updated: 2026-05-04 07:00A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.
A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).
A flaw was found in systemd, a core component of Linux operating systems. A local user, without special privileges, can exploit this vulnerability. By manipulating a specific systemd unit configuration where delegation is enabled and the user is not set, the user can trigger an internal error, leading to a Denial of Service (DoS). This means the affected system may become unresponsive or crash, impacting its availability.
A flaw was found in systemd-machined, a component of systemd. A local attacker can exploit a vulnerability related to how varlink interacts with the root namespace. This can lead to local privilege escalation, allowing the attacker to gain elevated access on the system.
A flaw was found in udev in systemd. A local user with access to malicious hardware devices can exploit this vulnerability. By providing unsanitized kernel output, the flaw allows for local root execution, leading to privilege escalation.
A flaw was found in nspawn, a container runtime environment within systemd. A local attacker or a process within an nspawn container could exploit this vulnerability by using a specially crafted optional configuration file. This could allow the attacker to escape the container's isolation and execute arbitrary actions on the host system.
A flaw was found in systemd. A local unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with a specially crafted array or map containing a null element. This can trigger an assert, leading to a Denial of Service (DoS) condition, which makes the system unavailable.
A flaw was found in systemd-journald. When the `ForwardToWall=yes` configuration is enabled, a local user who executes a `logger -p emerg` command can cause systemd-journald to send ANSI escape sequences to the terminals of other arbitrary users. This can lead to unintended output appearing on user terminals, potentially causing confusion or minor disruption.
CWE-117 - Improper Output Neutralization for Logs{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7299",
"url": "https://access.redhat.com/errata/RHSA-2026:7299"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-40228",
"url": "https://access.redhat.com/security/cve/CVE-2026-40228"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-40226",
"url": "https://access.redhat.com/security/cve/CVE-2026-40226"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-40225",
"url": "https://access.redhat.com/security/cve/CVE-2026-40225"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-40224",
"url": "https://access.redhat.com/security/cve/CVE-2026-40224"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-40223",
"url": "https://access.redhat.com/security/cve/CVE-2026-40223"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-29111",
"url": "https://access.redhat.com/security/cve/CVE-2026-29111"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-40227",
"url": "https://access.redhat.com/security/cve/CVE-2026-40227"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-4105",
"url": "https://access.redhat.com/security/cve/CVE-2026-4105"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7299.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-05-04T07:00:11+00:00",
"generator": {
"date": "2026-05-04T07:00:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:7299",
"initial_release_date": "2026-04-09T11:44:30+00:00",
"revision_history": [
{
"date": "2026-04-09T11:44:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-30T15:26:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-04T07:00:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-main@aarch64",
"product": {
"name": "systemd-main@aarch64",
"product_id": "systemd-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@260.1-2.1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-main@src",
"product": {
"name": "systemd-main@src",
"product_id": "systemd-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@260.1-2.1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-main@x86_64",
"product": {
"name": "systemd-main@x86_64",
"product_id": "systemd-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@260.1-2.1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-main@noarch",
"product": {
"name": "systemd-main@noarch",
"product_id": "systemd-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-networkd-defaults@260.1-2.1.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:systemd-main@aarch64"
},
"product_reference": "systemd-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:systemd-main@noarch"
},
"product_reference": "systemd-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:systemd-main@src"
},
"product_reference": "systemd-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:systemd-main@x86_64"
},
"product_reference": "systemd-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Asim Viladi Oglu Manizada"
]
}
],
"cve": "CVE-2026-4105",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2026-03-13T07:20:55.613000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2447262"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed the severity of this vulnerability as Moderate. The issue allows a local privilege escalation to root through the systemd-machined service when specific environmental conditions are met. Successful exploitation requires an unprivileged user to be logged into an active graphical desktop session on a system where systemd-machined is present. Additionally, the affected component is not typically installed by default on many systems and terminal-only or remote sessions (such as SSH) are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-4105"
},
{
"category": "external",
"summary": "RHBZ#2447262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447262"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-4105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4105"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862",
"url": "https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862"
}
],
"release_date": "2026-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T11:44:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7299"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method"
},
{
"cve": "CVE-2026-29111",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-03-23T22:01:54.593547+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2450505"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd, a system and service manager. An unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with spurious data. In older versions (v249 and earlier), this can lead to stack overwriting with attacker-controlled content, potentially enabling arbitrary code execution or privilege escalation. In newer versions (v250 and later), the flaw causes systemd to assert and freeze, resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-29111"
},
{
"category": "external",
"summary": "RHBZ#2450505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-29111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29111"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-29111",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29111"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a",
"url": "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6",
"url": "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412",
"url": "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd",
"url": "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f",
"url": "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f",
"url": "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69",
"url": "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6",
"url": "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c",
"url": "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8",
"url": "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764",
"url": "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764"
}
],
"release_date": "2026-03-23T21:03:56.120000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T11:44:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7299"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data"
},
{
"cve": "CVE-2026-40223",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"discovery_date": "2026-04-10T16:01:32.514881+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457318"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd, a core component of Linux operating systems. A local user, without special privileges, can exploit this vulnerability. By manipulating a specific systemd unit configuration where delegation is enabled and the user is not set, the user can trigger an internal error, leading to a Denial of Service (DoS). This means the affected system may become unresponsive or crash, impacting its availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: systemd: Local unprivileged user can cause Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-40223"
},
{
"category": "external",
"summary": "RHBZ#2457318",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457318"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-40223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40223"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/security/advisories/GHSA-x4h8-rrrg-q78f",
"url": "https://github.com/systemd/systemd/security/advisories/GHSA-x4h8-rrrg-q78f"
}
],
"release_date": "2026-04-10T15:10:56.605000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T11:44:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7299"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: systemd: Local unprivileged user can cause Denial of Service"
},
{
"cve": "CVE-2026-40224",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2026-04-10T16:02:05.270912+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457325"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd-machined, a component of systemd. A local attacker can exploit a vulnerability related to how varlink interacts with the root namespace. This can lead to local privilege escalation, allowing the attacker to gain elevated access on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: systemd-machined: Local privilege escalation via varlink",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-40224"
},
{
"category": "external",
"summary": "RHBZ#2457325",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457325"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40224"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-40224",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40224"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/security/advisories/GHSA-6pwp-j5vg-5j6m",
"url": "https://github.com/systemd/systemd/security/advisories/GHSA-6pwp-j5vg-5j6m"
}
],
"release_date": "2026-04-10T15:14:21.904000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T11:44:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7299"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: systemd-machined: Local privilege escalation via varlink"
},
{
"cve": "CVE-2026-40225",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2026-04-10T16:01:59.408544+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457324"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in udev in systemd. A local user with access to malicious hardware devices can exploit this vulnerability. By providing unsanitized kernel output, the flaw allows for local root execution, leading to privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: udev in systemd: Privilege escalation via malicious hardware devices and unsanitized kernel output",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-40225"
},
{
"category": "external",
"summary": "RHBZ#2457324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40225"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-40225",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40225"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/security/advisories/GHSA-vpfq-8p5f-jcqx",
"url": "https://github.com/systemd/systemd/security/advisories/GHSA-vpfq-8p5f-jcqx"
}
],
"release_date": "2026-04-10T15:16:19.827000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T11:44:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7299"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: udev in systemd: Privilege escalation via malicious hardware devices and unsanitized kernel output"
},
{
"cve": "CVE-2026-40226",
"cwe": {
"id": "CWE-348",
"name": "Use of Less Trusted Source"
},
"discovery_date": "2026-04-10T16:02:08.678891+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457326"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nspawn, a container runtime environment within systemd. A local attacker or a process within an nspawn container could exploit this vulnerability by using a specially crafted optional configuration file. This could allow the attacker to escape the container\u0027s isolation and execute arbitrary actions on the host system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: systemd nspawn: Escape-to-host action via crafted config file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-40226"
},
{
"category": "external",
"summary": "RHBZ#2457326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457326"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-40226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40226"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx",
"url": "https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx"
}
],
"release_date": "2026-04-10T15:18:10.447000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T11:44:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7299"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: systemd nspawn: Escape-to-host action via crafted config file"
},
{
"cve": "CVE-2026-40227",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2026-04-10T16:01:49.312669+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457322"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd. A local unprivileged user can exploit this vulnerability by making an Inter-Process Communication (IPC) API call with a specially crafted array or map containing a null element. This can trigger an assert, leading to a Denial of Service (DoS) condition, which makes the system unavailable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: systemd: Denial of Service via malicious IPC API call with null element",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A flaw in systemd allows a local unprivileged user to cause a Denial of Service by making a crafted Inter-Process Communication (IPC) API call. The issue is restricted to systemd v260 only, the systemd versions as shipped as with Red Hat products are not affected by this vulnerability as it doesn\u0027t ship the commit which introduced the vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-40227"
},
{
"category": "external",
"summary": "RHBZ#2457322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457322"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-40227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40227"
},
{
"category": "external",
"summary": "https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq",
"url": "https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq"
}
],
"release_date": "2026-04-10T15:19:51.433000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T11:44:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7299"
},
{
"category": "workaround",
"details": "This issue can be mitigated by changing the permission of the varsock file located at:\n~~~\n/run/systemd/io.systemd.Manager\n~~~\nto be accessible only by trusted or privileged users.",
"product_ids": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: systemd: Denial of Service via malicious IPC API call with null element"
},
{
"cve": "CVE-2026-40228",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2026-04-10T16:01:24.341176+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2457316"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd-journald. When the `ForwardToWall=yes` configuration is enabled, a local user who executes a `logger -p emerg` command can cause systemd-journald to send ANSI escape sequences to the terminals of other arbitrary users. This can lead to unintended output appearing on user terminals, potentially causing confusion or minor disruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: systemd-journald: Unintended output to user terminals via logger command",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-40228"
},
{
"category": "external",
"summary": "RHBZ#2457316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457316"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-40228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40228"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2026/04/08/1",
"url": "https://www.openwall.com/lists/oss-security/2026/04/08/1"
}
],
"release_date": "2026-04-10T15:48:44.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T11:44:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7299"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:systemd-main@aarch64",
"Red Hat Hardened Images:systemd-main@noarch",
"Red Hat Hardened Images:systemd-main@src",
"Red Hat Hardened Images:systemd-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "systemd: systemd-journald: Unintended output to user terminals via logger command"
}
]
}
FKIE_CVE-2026-40227
Vulnerability from fkie_nvd - Published: 2026-04-10 16:16 - Updated: 2026-04-14 19:415.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| systemd_project | systemd | 260 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:systemd_project:systemd:260:-:*:*:*:*:*:*",
"matchCriteriaId": "2CC53AC2-A12C-42A6-9165-E780FD9DC42D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element."
}
],
"id": "CVE-2026-40227",
"lastModified": "2026-04-14T19:41:59.977",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-04-10T16:16:33.607",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1025"
}
],
"source": "cve@mitre.org",
"type": "Primary"
}
]
}
GHSA-X53V-PXF5-CHX6
Vulnerability from github – Published: 2026-04-10 18:31 – Updated: 2026-04-10 18:31In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.
{
"affected": [],
"aliases": [
"CVE-2026-40227"
],
"database_specific": {
"cwe_ids": [
"CWE-1025"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-10T16:16:33Z",
"severity": "MODERATE"
},
"details": "In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.",
"id": "GHSA-x53v-pxf5-chx6",
"modified": "2026-04-10T18:31:18Z",
"published": "2026-04-10T18:31:18Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/systemd/systemd/security/advisories/GHSA-848h-497j-8vjq"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40227"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.