-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4942-1
security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso
July 20, 2021
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : systemd
CVE ID : CVE-2021-33910
The Qualys Research Labs discovered that an attacker-controlled
allocation using the alloca() function could result in memory
corruption, allowing to crash systemd and hence the entire operating
system.
Details can be found in the Qualys advisory at
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
For the stable distribution (buster), this problem has been fixed in
version 241-7~deb10u8.
We recommend that you upgrade your systemd packages.
For the detailed security status of systemd please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/systemd
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmD2xwFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TmUA//WP2SIm6J0LwnV8jd4Gy2p+wpErCgL44k9rU0ZpF7y2XnsnfYuu2IwsML aHNsTve5ZE9xK/3UEAvPk+3aVER2HTzeBMZUUdy37/G7fvb2yDhZ+/57w7GmcFyB yB7GIexiPpnkeI45CvRtQhoYl4QurgQMU4vCvIZQdBewJN+lvmQ5UAijgqQoOWIl ciiIU81k2R1lWsWUH61WawEpa3CivHs8MDK//yuAZwi62tIfHs0n1lKa+UZSjOEv lgdAHXixajba21pLLRi/EWzO2NcIDGw54YEvPU4Tjo1pQF84T3+iPJHS7Alwmv/8 biikENWEyWLwH6vfdfc3yM+ChK/J8qZOiEO3CXLANyPKlWMSIbkvtJEHHoBIaPl5 NlwCmiQdir/VQFcb2GNkmpBycmTZCaMdJCIbWhaSTTtIKvH8N5SOW+W6mqcJEAdc QcFgbPXDm7amSxa20qZNV/AIwNMm77p6mLLJVQ81UHKuHviP+WW4Z8UoCfv3nUZZ O4gYP8uUjoACu+ln5+HZiUtffyFaMTfv/cUJ98207jT02dpwOKyqMOw1OH+/Juo2 9UeKv6xJh2BydVODZXLBXYNbUCuH3YIp0W45KqGvZYVjxDDvKSOW33MsOoaVVyQw cgOIdXoMk49vUdDBg6oVXa8wQGk/ccs6KG7VcZB2WN8RYrpA3gc=
=3EBw
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)