Gentoo update for systemd



Published: 2023-05-03
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-3997
CVE-2022-3821
CWE-ID CWE-674
CWE-193
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Gentoo Linux
Operating systems & Components / Operating system

sys-apps/systemd-tmpfiles
Operating systems & Components / Operating system package or component

sys-apps/systemd
Operating systems & Components / Operating system package or component

Vendor Gentoo

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Uncontrolled recursion

EUVDB-ID: #VU59358

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3997

CWE-ID: CWE-674 - Uncontrolled Recursion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrolled recursion in systemd-tmpfiles. A local user can create multiple nested directories in the /tmp folder and case systemd to crash during the system boot.

Mitigation

Update the affected packages.
sys-apps/systemd to version: 251.3
sys-apps/systemd-tmpfiles to version: 251.3
sys-apps/systemd-utils to version:
sys-fs/udev to version:

Vulnerable software versions

Gentoo Linux: All versions

sys-apps/systemd-tmpfiles: before 251.3

sys-apps/systemd: before 251.3

External links

http://security.gentoo.org/glsa/202305-15


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Off-by-one

EUVDB-ID: #VU69807

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-3821

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an off-by-one error within the format_timespan() function in time-util.c. A local user can trigger an off-by-one error and perform a denial of service (DoS) attack.


Mitigation

Update the affected packages.
sys-apps/systemd to version: 251.3
sys-apps/systemd-tmpfiles to version: 251.3
sys-apps/systemd-utils to version:
sys-fs/udev to version:

Vulnerable software versions

Gentoo Linux: All versions

sys-apps/systemd-tmpfiles: before 251.3

sys-apps/systemd: before 251.3

External links

http://security.gentoo.org/glsa/202305-15


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###