Description
basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.
Published: 2021-07-20
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2715-1 systemd security update
Debian DSA Debian DSA DSA-4942-1 systemd security update
EUVD EUVD EUVD-2021-20582 basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.
Ubuntu USN Ubuntu USN USN-5013-1 systemd vulnerabilities
Ubuntu USN Ubuntu USN USN-5013-2 systemd vulnerabilities
References
Link Providers
http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/08/04/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/08/17/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/09/07/3 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf cve-icon cve-icon
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b cve-icon cve-icon
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce cve-icon cve-icon
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538 cve-icon cve-icon
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61 cve-icon cve-icon
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b cve-icon cve-icon
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9 cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-33910 cve-icon
https://security.gentoo.org/glsa/202107-48 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20211104-0008/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-33910 cve-icon
https://www.debian.org/security/2021/dsa-4942 cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2021/07/20/2 cve-icon cve-icon
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt cve-icon
History

Mon, 09 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Debian Debian Linux
Fedoraproject Fedora
Netapp Hci Management Node Solidfire
Redhat Enterprise Linux Rhel Eus Rhev Hypervisor
Systemd Project Systemd
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-06-09T15:44:25.308Z

Reserved: 2021-06-07T00:00:00.000Z

Link: CVE-2021-33910

cve-icon Vulnrichment

Updated: 2024-08-04T00:05:51.738Z

cve-icon NVD

Status : Modified

Published: 2021-07-20T19:15:09.783

Modified: 2025-06-09T16:15:32.380

Link: CVE-2021-33910

cve-icon Redhat

Severity : Important

Publid Date: 2021-07-20T12:00:00Z

Links: CVE-2021-33910 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses