systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.

Project Subscriptions

Vendors Products
Systemd Subscribe
Systemd Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 24 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1287
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Systemd
Systemd systemd
Vendors & Products Systemd
Systemd systemd

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.
Title systemd: Local unprivileged user can trigger an assert
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-23T21:03:56.120Z

Reserved: 2026-03-03T21:54:06.709Z

Link: CVE-2026-29111

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-23T22:16:26.267

Modified: 2026-03-23T22:16:26.267

Link: CVE-2026-29111

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-23T21:03:56Z

Links: CVE-2026-29111 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:32:42Z

Weaknesses