Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2021-3997 CVE-2022-3821 |
CWE-ID | CWE-674 CWE-193 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Gentoo Linux Operating systems & Components / Operating system sys-apps/systemd-tmpfiles Operating systems & Components / Operating system package or component sys-apps/systemd Operating systems & Components / Operating system package or component |
Vendor | Gentoo |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU59358
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-3997
CWE-ID:
CWE-674 - Uncontrolled Recursion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to uncontrolled recursion in systemd-tmpfiles. A local user can create multiple nested directories in the /tmp folder and case systemd to crash during the system boot.
Update the affected packages.
sys-apps/systemd to version: 251.3
sys-apps/systemd-tmpfiles to version: 251.3
sys-apps/systemd-utils to version:
sys-fs/udev to version:
Gentoo Linux: All versions
sys-apps/systemd-tmpfiles: before 251.3
sys-apps/systemd: before 251.3
External linkshttp://security.gentoo.org/glsa/202305-15
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69807
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-3821
CWE-ID:
CWE-193 - Off-by-one Error
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an off-by-one error within the format_timespan() function in time-util.c. A local user can trigger an off-by-one error and perform a denial of service (DoS) attack.
Update the affected packages.
sys-apps/systemd to version: 251.3
sys-apps/systemd-tmpfiles to version: 251.3
sys-apps/systemd-utils to version:
sys-fs/udev to version:
Gentoo Linux: All versions
sys-apps/systemd-tmpfiles: before 251.3
sys-apps/systemd: before 251.3
External linkshttp://security.gentoo.org/glsa/202305-15
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.