Impact
Local non‑privileged users can trigger an assertion failure in systemd by sending an IPC message that contains an array or map with a null element. The assertion causes systemd to terminate, resulting in a denial of service for the daemon and services that depend on it. The flaw is a null pointer dereference as indicated by the associated CWE identifiers.
Affected Systems
The vulnerability affects the systemd project’s systemd package, versions 260 through 260.x but not 261 and later. Linux distributions shipping systemd 260 without the 261 update are vulnerable. Only the systemd daemon and its IPC interfaces are impacted.
Risk and Exploitability
The CVSS score of 6.2 indicates medium severity, while an EPSS score of less than 1 % suggests a low probability of exploitation. The flaw is not listed in the CISA KEV catalog. Attackers must have local access and be able to use the IPC API to send crafted messages to systemd; thus exploitation requires local, non‑privileged access and does not need elevated privileges.
OpenCVE Enrichment