basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fedoraproject Subscribe
Hci Management Node Subscribe
Solidfire Subscribe
Enterprise Linux Subscribe
Rhel Eus Subscribe
Rhev Hypervisor Subscribe
Systemd Project Subscribe
Systemd Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2715-1 systemd security update
Debian DSA Debian DSA DSA-4942-1 systemd security update
EUVD EUVD EUVD-2021-20582 basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.
Ubuntu USN Ubuntu USN USN-5013-1 systemd vulnerabilities
Ubuntu USN Ubuntu USN USN-5013-2 systemd vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/08/04/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/08/17/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/09/07/3 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf cve-icon cve-icon
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b cve-icon cve-icon
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce cve-icon cve-icon
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538 cve-icon cve-icon
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61 cve-icon cve-icon
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b cve-icon cve-icon
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9 cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-33910 cve-icon
https://security.gentoo.org/glsa/202107-48 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20211104-0008/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-33910 cve-icon
https://www.debian.org/security/2021/dsa-4942 cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2021/07/20/2 cve-icon cve-icon
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt cve-icon
History

Mon, 09 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-06-09T15:44:25.308Z

Reserved: 2021-06-07T00:00:00.000Z

Link: CVE-2021-33910

cve-icon Vulnrichment

Updated: 2024-08-04T00:05:51.738Z

cve-icon NVD

Status : Modified

Published: 2021-07-20T19:15:09.783

Modified: 2025-06-09T16:15:32.380

Link: CVE-2021-33910

cve-icon Redhat

Severity : Important

Publid Date: 2021-07-20T12:00:00Z

Links: CVE-2021-33910 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses