Systemd Project

Systemd

55 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 10.04.2026 15:48:44
  • Zuletzt bearbeitet 05.05.2026 02:16:04

In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a "logger -p emerg" command is executed, if ForwardToWall=yes is set.

  • EPSS 0.02%
  • Veröffentlicht 10.04.2026 15:19:51
  • Zuletzt bearbeitet 14.04.2026 19:41:59

In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.

  • EPSS 0.01%
  • Veröffentlicht 10.04.2026 15:18:10
  • Zuletzt bearbeitet 17.04.2026 22:02:15

In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.

  • EPSS 0.05%
  • Veröffentlicht 10.04.2026 15:16:19
  • Zuletzt bearbeitet 27.04.2026 19:00:02

In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output.

  • EPSS 0.01%
  • Veröffentlicht 10.04.2026 15:14:21
  • Zuletzt bearbeitet 27.04.2026 19:08:24

In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink can be used to reach the root namespace.

  • EPSS 0.02%
  • Veröffentlicht 10.04.2026 15:10:56
  • Zuletzt bearbeitet 27.04.2026 19:08:41

In systemd 258 before 260, a local unprivileged user can trigger an assert when a Delegate=yes and User=<unset> unit exists and is running.

  • EPSS 0.02%
  • Veröffentlicht 23.03.2026 21:03:56
  • Zuletzt bearbeitet 15.04.2026 16:44:38

systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker contr...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 30.05.2025 13:13:26
  • Zuletzt bearbeitet 12.05.2026 13:17:21

A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, suc...

  • EPSS 0.48%
  • Veröffentlicht 23.12.2023 13:15:07
  • Zuletzt bearbeitet 04.11.2025 17:15:43

A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.

  • EPSS 0.13%
  • Veröffentlicht 13.06.2023 17:15:14
  • Zuletzt bearbeitet 21.11.2024 08:01:52

An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent "a reply...