[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 4942-1] systemd security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4942-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
July 20, 2021                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : systemd
CVE ID         : CVE-2021-33910

The Qualys Research Labs discovered that an attacker-controlled
allocation using the alloca() function could result in memory
corruption, allowing to crash systemd and hence the entire operating
system.

Details can be found in the Qualys advisory at
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt

For the stable distribution (buster), this problem has been fixed in
version 241-7~deb10u8.

We recommend that you upgrade your systemd packages.

For the detailed security status of systemd please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/systemd

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=3EBw
-----END PGP SIGNATURE-----


Reply to: