-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2715-1 [email protected] https://www.debian.org/lts/security/ Salvatore Bonaccorso July 20, 2021 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : systemd Version : 232-25+deb9u13 CVE ID : CVE-2021-33910 The Qualys Research Labs discovered that an attacker-controlled allocation using the alloca() function could result in memory corruption, allowing to crash systemd and hence the entire operating system. Details can be found in the Qualys advisory at https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt For Debian 9 stretch, this problem has been fixed in version 232-25+deb9u13. We recommend that you upgrade your systemd packages. For the detailed security status of systemd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/systemd Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmD2xwhfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QPyQ//d78ltclVH9X7d42Yh70EE6kIcI7T9iCkqKTllPJinJ5Me/pWpapfNvxI f3zwWmwCgwAqFKVxzUPeMWSYsxBlMXDvYbq82D6oxIu3uxfb1lpdhhUno7Y89RK+ aeZyJNyqSQl7wOkdYbYwiv/CmXX8HvxCVMo9GLx9gRkRMIKKzEPYSg7O9odgybLf 3WETQ2LhErw3TriExu+IL5gmv46XUvbd0u+O7HzdTm1kL7ezWl1mFqHNAgWMrf+a atPjWFIhtb584tow9qfQA2ZS04BbTqPHBCFgC6tGTgn6CxM/N2Mrqr4Ona1AV4+H IMJaGoUf9ezQyLzbu8yj/7lybrzMVMNDXomgzVlliWKiAhBedJi64E+PqPBcZNF4 5kPgsUuVhqJmwUEAMYQlZhAcpP4VfA/d7nKbSuujzsESutuWdyp4kODj9OB27Ag3 ie7LrK6dZM47IJMi3xov4ukg9JUj7PGrmUrsVswrGiGmmeyUxV24/1UfbV1tjZcf LnLlarkAHSxv4QLB9suVWamE9m1vnYPQSf+EwkCVLVQ9YPjGqSu/nVTpqeddxxu5 nSfdJrn6dePvakCLlA5Bj0EXoMoDFT+odpj6oGnJR0Xt/BHOEr18k3VRQ7kIxh7q zyNZv6rf+ssU7DlOk6Y1WlNiH0YOjY5+MDBpEUQB3TxttQbUS7E= =WnA1 -----END PGP SIGNATURE-----
