USN-3094-1

Source
https://ubuntu.com/security/notices/USN-3094-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3094-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3094-1
Related
Published
2016-09-29T07:53:06Z
Modified
2026-02-10T04:41:02Z
Summary
systemd vulnerability
Details

Andrew Ayer discovered that Systemd improperly handled zero-length notification messages. A local unprivileged attacker could use this to cause a denial of service (init crash leading to system unavailability).

References

Affected packages

Ubuntu:16.04:LTS / systemd

Package

Name
systemd
Purl
pkg:deb/ubuntu/systemd@229-4ubuntu10?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
229-4ubuntu10

Affected versions

Other
225-1ubuntu9
227-2ubuntu1
227-2ubuntu2
228-1ubuntu2
228-2ubuntu1
228-2ubuntu2
228-3ubuntu1
228-4ubuntu1
228-4ubuntu2
228-5ubuntu1
228-5ubuntu2
228-5ubuntu3
228-6ubuntu1
229-1ubuntu2
229-1ubuntu4
229-2ubuntu1
229-3ubuntu1
229-3ubuntu2
229-4ubuntu1
229-4ubuntu4
229-4ubuntu5
229-4ubuntu6
229-4ubuntu7
229-4ubuntu8

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libnss-myhostname",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "libnss-mymachines",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "libnss-resolve",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "libpam-systemd",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "libsystemd-dev",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "libsystemd0",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "libudev-dev",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "libudev1",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "systemd",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "systemd-container",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "systemd-coredump",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "systemd-journal-remote",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "systemd-sysv",
            "binary_version": "229-4ubuntu10"
        },
        {
            "binary_name": "udev",
            "binary_version": "229-4ubuntu10"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:16.04:LTS",
    "cves": []
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3094-1.json"