CVE-2016-7796

The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0003.html
http://www.openwall.com/lists/oss-security/2016/09/30/1 Third Party Advisory
http://www.securityfocus.com/bid/93250 Third Party Advisory
http://www.securitytracker.com/id/1037320
https://bugzilla.redhat.com/show_bug.cgi?id=1381911 Issue Tracking Third Party Advisory VDB Entry
https://github.com/systemd/systemd/issues/4234#issuecomment-250441246 Exploit Patch Vendor Advisory
https://rhn.redhat.com/errata/RHBA-2015-2092.html Third Party Advisory
https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet Exploit Technical Description Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0003.html
http://www.openwall.com/lists/oss-security/2016/09/30/1 Third Party Advisory
http://www.securityfocus.com/bid/93250 Third Party Advisory
http://www.securitytracker.com/id/1037320
https://bugzilla.redhat.com/show_bug.cgi?id=1381911 Issue Tracking Third Party Advisory VDB Entry
https://github.com/systemd/systemd/issues/4234#issuecomment-250441246 Exploit Patch Vendor Advisory
https://rhn.redhat.com/errata/RHBA-2015-2092.html Third Party Advisory
https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:systemd_project:systemd:209:*:*:*:*:*:*:*
cpe:2.3:a:systemd_project:systemd:213:*:*:*:*:*:*:*
cpe:2.3:a:systemd_project:systemd:214:*:*:*:*:*:*:*
cpe:2.3:a:systemd_project:systemd:229:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:ltss:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server_for_sap:12.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-10-13 14:59

Updated : 2025-04-12 10:46


NVD link : CVE-2016-7796

Mitre link : CVE-2016-7796

CVE.ORG link : CVE-2016-7796


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_server
  • enterprise_linux_hpc_node

systemd_project

  • systemd

novell

  • suse_linux_enterprise_server_for_sap
  • suse_linux_enterprise_server
  • suse_linux_enterprise_software_development_kit
  • suse_linux_enterprise_desktop
CWE
CWE-20

Improper Input Validation