CVE-2026-29111 (GCVE-0-2026-29111)

Vulnerability from cvelistv5 – Published: 2026-03-23 21:03 – Updated: 2026-03-25 19:13
VLAI?
Title
systemd: Local unprivileged user can trigger an assert
Summary
systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.
CWE
  • CWE-269 - Improper Privilege Management
Assigner
Impacted products
Vendor Product Version
systemd systemd Affected: >= 239, < 257.11
Affected: >= 258, < 258.5
Affected: >= 259, < 259.2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-29111",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-25T19:12:36.640498Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-25T19:13:11.875Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "systemd",
          "vendor": "systemd",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 239, \u003c 257.11"
            },
            {
              "status": "affected",
              "version": "\u003e= 258, \u003c 258.5"
            },
            {
              "status": "affected",
              "version": "\u003e= 259, \u003c 259.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269: Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-23T21:03:56.120Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764"
        },
        {
          "name": "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a"
        },
        {
          "name": "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6"
        },
        {
          "name": "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412"
        },
        {
          "name": "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd"
        },
        {
          "name": "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f"
        },
        {
          "name": "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f"
        },
        {
          "name": "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69"
        },
        {
          "name": "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6"
        },
        {
          "name": "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c"
        },
        {
          "name": "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8"
        }
      ],
      "source": {
        "advisory": "GHSA-gx6q-6f99-m764",
        "discovery": "UNKNOWN"
      },
      "title": "systemd: Local unprivileged user can trigger an assert"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2026-29111",
    "datePublished": "2026-03-23T21:03:56.120Z",
    "dateReserved": "2026-03-03T21:54:06.709Z",
    "dateUpdated": "2026-03-25T19:13:11.875Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-29111\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-03-23T22:16:26.267\",\"lastModified\":\"2026-03-24T15:53:48.067\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.\"},{\"lang\":\"es\",\"value\":\"systemd, un gestor de sistemas y servicios, (como PID 1) activa una aserci\u00f3n y congela la ejecuci\u00f3n cuando se realiza una llamada a la API IPC no privilegiada con datos espurios. En la versi\u00f3n v249 y anteriores, el efecto no es una aserci\u00f3n, sino una sobrescritura de pila, con contenido controlado por el atacante. A partir de la versi\u00f3n v250 y posteriores, esto no es posible ya que la comprobaci\u00f3n de seguridad provoca una aserci\u00f3n en su lugar. Esta llamada IPC se a\u00f1adi\u00f3 en v239, por lo que las versiones anteriores a esa no est\u00e1n afectadas. Las versiones 260-rc1, 259.2, 258.5 y 257.11 contienen parches. No se conocen soluciones alternativas disponibles.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"references\":[{\"url\":\"https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764\",\"source\":\"security-advisories@github.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-29111\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-25T19:12:36.640498Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-25T19:13:03.941Z\"}}], \"cna\": {\"title\": \"systemd: Local unprivileged user can trigger an assert\", \"source\": {\"advisory\": \"GHSA-gx6q-6f99-m764\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"systemd\", \"product\": \"systemd\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 239, \u003c 257.11\"}, {\"status\": \"affected\", \"version\": \"\u003e= 258, \u003c 258.5\"}, {\"status\": \"affected\", \"version\": \"\u003e= 259, \u003c 259.2\"}]}], \"references\": [{\"url\": \"https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764\", \"name\": \"https://github.com/systemd/systemd/security/advisories/GHSA-gx6q-6f99-m764\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a\", \"name\": \"https://github.com/systemd/systemd/commit/1d22f706bd04f45f8422e17fbde3f56ece17758a\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6\", \"name\": \"https://github.com/systemd/systemd/commit/20021e7686426052e3a7505425d7e12085feb2a6\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412\", \"name\": \"https://github.com/systemd/systemd/commit/21167006574d6b83813c7596759b474f56562412\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd\", \"name\": \"https://github.com/systemd/systemd/commit/3cee294fe8cf4fa0eff933ab21416d099942cabd\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f\", \"name\": \"https://github.com/systemd/systemd/commit/42aee39107fbdd7db1ccd402a2151822b2805e9f\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f\", \"name\": \"https://github.com/systemd/systemd/commit/54588d2dedff54bfb6036670820650e4ea74628f\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69\", \"name\": \"https://github.com/systemd/systemd/commit/7ac3220213690e8a8d6d2a6e81e43bd1dce01d69\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6\", \"name\": \"https://github.com/systemd/systemd/commit/80acea4ef80a4bb78560ed970c34952299b890d6\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c\", \"name\": \"https://github.com/systemd/systemd/commit/b5fd14693057e5f2c9b4a49603be64ec3608ff6c\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8\", \"name\": \"https://github.com/systemd/systemd/commit/efa6ba2ab625aaa160ac435a09e6482fc63bdbe8\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-269\", \"description\": \"CWE-269: Improper Privilege Management\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-03-23T21:03:56.120Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2026-29111\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-25T19:13:11.875Z\", \"dateReserved\": \"2026-03-03T21:54:06.709Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-03-23T21:03:56.120Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…