Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Systemd Project
Systemd Project systemd |
|
| CPEs | cpe:2.3:a:systemd_project:systemd:260:-:*:*:*:*:*:* | |
| Vendors & Products |
Systemd Project
Systemd Project systemd |
Tue, 14 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Systemd
Systemd systemd |
|
| Vendors & Products |
Systemd
Systemd systemd |
Sat, 11 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | systemd: systemd: Denial of Service via malicious IPC API call with null element | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 10 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element. | |
| Weaknesses | CWE-1025 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-14T14:49:32.971Z
Reserved: 2026-04-10T15:19:51.012Z
Link: CVE-2026-40227
Updated: 2026-04-14T14:49:27.413Z
Status : Analyzed
Published: 2026-04-10T16:16:33.607
Modified: 2026-04-14T19:41:59.977
Link: CVE-2026-40227
OpenCVE Enrichment
Updated: 2026-04-15T16:00:07Z