CVE Vulnerabilities

CVE-2021-33910

This vulnerability is marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher, but the details of it are not yet publicly available yet.

This page will reflect the classification results once they are available through NVD.

Any vendor information available is shown as below.

Redhat

CVE-2021-33910 systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash

Mitigation

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.

Affected Software List

NameVendorVersion
Red Hat Enterprise Linux 8RedHatsystemd-0:239-45.el8_4.2
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatsystemd-0:239-18.el8_1.8
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatsystemd-0:239-31.el8_2.4
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8RedHatredhat-virtualization-host-0:4.4.7-20210715.1.el8_4

Ubuntu

basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.

Affected Software List

NameVendorVersion
SystemdUbuntu/bionic237-3ubuntu10.49
SystemdUbuntu/esm-infra/xenial229-4ubuntu21.31+esm1
SystemdUbuntu/focal245.4-4ubuntu3.10
SystemdUbuntu/groovy246.6-1ubuntu1.7
SystemdUbuntu/trustyout of standard support
SystemdUbuntu/xenialout of standard support
SystemdUbuntu/devel248.3-1ubuntu3
SystemdUbuntu/hirsute247.3-3ubuntu3.4
SystemdUbuntu/upstreamTBD