-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4942-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso July 20, 2021 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : systemd CVE ID : CVE-2021-33910 The Qualys Research Labs discovered that an attacker-controlled allocation using the alloca() function could result in memory corruption, allowing to crash systemd and hence the entire operating system. Details can be found in the Qualys advisory at https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt For the stable distribution (buster), this problem has been fixed in version 241-7~deb10u8. We recommend that you upgrade your systemd packages. For the detailed security status of systemd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/systemd Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmD2xwFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TmUA//WP2SIm6J0LwnV8jd4Gy2p+wpErCgL44k9rU0ZpF7y2XnsnfYuu2IwsML aHNsTve5ZE9xK/3UEAvPk+3aVER2HTzeBMZUUdy37/G7fvb2yDhZ+/57w7GmcFyB yB7GIexiPpnkeI45CvRtQhoYl4QurgQMU4vCvIZQdBewJN+lvmQ5UAijgqQoOWIl ciiIU81k2R1lWsWUH61WawEpa3CivHs8MDK//yuAZwi62tIfHs0n1lKa+UZSjOEv lgdAHXixajba21pLLRi/EWzO2NcIDGw54YEvPU4Tjo1pQF84T3+iPJHS7Alwmv/8 biikENWEyWLwH6vfdfc3yM+ChK/J8qZOiEO3CXLANyPKlWMSIbkvtJEHHoBIaPl5 NlwCmiQdir/VQFcb2GNkmpBycmTZCaMdJCIbWhaSTTtIKvH8N5SOW+W6mqcJEAdc QcFgbPXDm7amSxa20qZNV/AIwNMm77p6mLLJVQ81UHKuHviP+WW4Z8UoCfv3nUZZ O4gYP8uUjoACu+ln5+HZiUtffyFaMTfv/cUJ98207jT02dpwOKyqMOw1OH+/Juo2 9UeKv6xJh2BydVODZXLBXYNbUCuH3YIp0W45KqGvZYVjxDDvKSOW33MsOoaVVyQw cgOIdXoMk49vUdDBg6oVXa8wQGk/ccs6KG7VcZB2WN8RYrpA3gc= =3EBw -----END PGP SIGNATURE-----