OESA-2026-1915

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1915
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1915.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-1915
Upstream
Published
2026-04-17T12:59:42Z
Modified
2026-04-17T13:20:18.119007Z
Summary
systemd security update
Details

systemd is a system and service manager that runs as PID 1 and starts the rest of the system.

Security Fix(es):

systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.(CVE-2026-29111)

A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.(CVE-2026-4105)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:24.03-LTS-SP1 / systemd

Package

Name
systemd
Purl
pkg:rpm/openEuler/systemd&distro=openEuler-24.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
255-57.oe2403sp1

Ecosystem specific

{
    "noarch": [
        "systemd-help-255-57.oe2403sp1.noarch.rpm"
    ],
    "x86_64": [
        "systemd-255-57.oe2403sp1.x86_64.rpm",
        "systemd-container-255-57.oe2403sp1.x86_64.rpm",
        "systemd-cryptsetup-255-57.oe2403sp1.x86_64.rpm",
        "systemd-debuginfo-255-57.oe2403sp1.x86_64.rpm",
        "systemd-debugsource-255-57.oe2403sp1.x86_64.rpm",
        "systemd-devel-255-57.oe2403sp1.x86_64.rpm",
        "systemd-libs-255-57.oe2403sp1.x86_64.rpm",
        "systemd-networkd-255-57.oe2403sp1.x86_64.rpm",
        "systemd-nspawn-255-57.oe2403sp1.x86_64.rpm",
        "systemd-pam-255-57.oe2403sp1.x86_64.rpm",
        "systemd-resolved-255-57.oe2403sp1.x86_64.rpm",
        "systemd-timesyncd-255-57.oe2403sp1.x86_64.rpm",
        "systemd-udev-255-57.oe2403sp1.x86_64.rpm"
    ],
    "aarch64": [
        "systemd-255-57.oe2403sp1.aarch64.rpm",
        "systemd-container-255-57.oe2403sp1.aarch64.rpm",
        "systemd-cryptsetup-255-57.oe2403sp1.aarch64.rpm",
        "systemd-debuginfo-255-57.oe2403sp1.aarch64.rpm",
        "systemd-debugsource-255-57.oe2403sp1.aarch64.rpm",
        "systemd-devel-255-57.oe2403sp1.aarch64.rpm",
        "systemd-libs-255-57.oe2403sp1.aarch64.rpm",
        "systemd-networkd-255-57.oe2403sp1.aarch64.rpm",
        "systemd-nspawn-255-57.oe2403sp1.aarch64.rpm",
        "systemd-pam-255-57.oe2403sp1.aarch64.rpm",
        "systemd-resolved-255-57.oe2403sp1.aarch64.rpm",
        "systemd-timesyncd-255-57.oe2403sp1.aarch64.rpm",
        "systemd-udev-255-57.oe2403sp1.aarch64.rpm"
    ],
    "src": [
        "systemd-255-57.oe2403sp1.src.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-1915.json"