First published: Wed Sep 28 2016(Updated: )
A flaw was found in the way systemd handled empty notification messages. A local attacker could use this flaw to make systemd freeze its execution, preventing further management of system services, system shutdown, or zombie process collection via systemd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/systemd | <0:219-30.el7_3.3 | 0:219-30.el7_3.3 |
redhat/systemd | <0:219-19.el7_2.18 | 0:219-19.el7_2.18 |
Ubuntu Linux | =16.04 | |
systemd | <=231 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7795 is classified as a high severity vulnerability, affecting the stability of the systemd service manager.
To mitigate CVE-2016-7795, upgrade systemd to version 0:219-30.el7_3.3 or later for Red Hat systems, or ensure your systemd version is updated to 231 or newer for other distributions.
CVE-2016-7795 affects various versions of systemd, particularly on Red Hat Enterprise Linux 7 and Ubuntu 16.04.
Yes, CVE-2016-7795 can lead to system outages by freezing systemd's execution, preventing service management.
CVE-2016-7795 is a local vulnerability, allowing local attackers to exploit the flaw.