In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.
History

Tue, 14 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Systemd Project
Systemd Project systemd
CPEs cpe:2.3:a:systemd_project:systemd:260:-:*:*:*:*:*:*
Vendors & Products Systemd Project
Systemd Project systemd

Tue, 14 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Systemd
Systemd systemd
Vendors & Products Systemd
Systemd systemd

Sat, 11 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Title systemd: systemd: Denial of Service via malicious IPC API call with null element
Weaknesses CWE-476
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 10 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Description In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element.
Weaknesses CWE-1025
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-14T14:49:32.971Z

Reserved: 2026-04-10T15:19:51.012Z

Link: CVE-2026-40227

cve-icon Vulnrichment

Updated: 2026-04-14T14:49:27.413Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T16:16:33.607

Modified: 2026-04-14T19:41:59.977

Link: CVE-2026-40227

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-10T15:19:51Z

Links: CVE-2026-40227 - Bugzilla