First published: Fri Jun 11 2021(Updated: )
Systemd is vulnerable to a denial of service, caused by a memory allocation with an excessive size value in basic/unit-name.c. By sending a specially-crafted request, a local attacker could exploit this vulnerability to cause the system to crash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/systemd | <249 | 249 |
redhat/systemd | <0:239-45.el8_4.2 | 0:239-45.el8_4.2 |
redhat/systemd | <0:239-18.el8_1.8 | 0:239-18.el8_1.8 |
redhat/systemd | <0:239-31.el8_2.4 | 0:239-31.el8_2.4 |
redhat/redhat-virtualization-host | <0:4.4.7-20210715.1.el8_4 | 0:4.4.7-20210715.1.el8_4 |
Systemd Project Systemd | <246.15 | |
Systemd Project Systemd | >=247<247.8 | |
Systemd Project Systemd | >=248<248.5 | |
Systemd Project Systemd | >=249<249.1 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =10.0 | |
Netapp Hci Management Node | ||
Netapp Solidfire | ||
debian/systemd | 241-7~deb10u8 241-7~deb10u10 247.3-7+deb11u4 252.17-1~deb12u1 254.5-1 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 |
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-33910 is a vulnerability found in systemd that allows a local attacker to crash the system by allocating a large amount of space in the stack.
The severity of CVE-2021-33910 is high with a CVSS score of 6.2.
CVE-2021-33910 affects systemd by exploiting the use of alloca function with an uncontrolled size in the unit_name_path_escape function, leading to a stack-based buffer overflow.
To fix CVE-2021-33910, update systemd to version 249 or higher.
You can find more information about CVE-2021-33910 in the official GitHub repository of systemd.