{"id":"UBUNTU-CVE-2021-33910","details":"basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.","modified":"2026-02-04T03:36:58.547065Z","published":"2021-07-20T12:00:00Z","related":["USN-5013-1","USN-5013-2"],"upstream":["CVE-2021-33910"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-33910"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5013-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5013-2"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2021-33910"}],"affected":[{"package":{"name":"systemd","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/systemd@229-4ubuntu21.31+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"229-4ubuntu21.31+esm1"}]}],"versions":["225-1ubuntu9","227-2ubuntu1","227-2ubuntu2","228-1ubuntu2","228-2ubuntu1","228-2ubuntu2","228-3ubuntu1","228-4ubuntu1","228-4ubuntu2","228-5ubuntu1","228-5ubuntu2","228-5ubuntu3","228-6ubuntu1","229-1ubuntu2","229-1ubuntu4","229-2ubuntu1","229-3ubuntu1","229-3ubuntu2","229-4ubuntu1","229-4ubuntu4","229-4ubuntu5","229-4ubuntu6","229-4ubuntu7","229-4ubuntu8","229-4ubuntu10","229-4ubuntu11","229-4ubuntu12","229-4ubuntu13","229-4ubuntu16","229-4ubuntu17","229-4ubuntu19","229-4ubuntu20","229-4ubuntu21","229-4ubuntu21.1","229-4ubuntu21.2","229-4ubuntu21.3","229-4ubuntu21.4","229-4ubuntu21.5","229-4ubuntu21.6","229-4ubuntu21.8","229-4ubuntu21.9","229-4ubuntu21.10","229-4ubuntu21.15","229-4ubuntu21.16","229-4ubuntu21.17","229-4ubuntu21.19","229-4ubuntu21.21","229-4ubuntu21.22","229-4ubuntu21.23","229-4ubuntu21.27","229-4ubuntu21.28","229-4ubuntu21.29","229-4ubuntu21.31"],"ecosystem_specific":{"binaries":[{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"libnss-myhostname"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"libnss-mymachines"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"libnss-resolve"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"libpam-systemd"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"libsystemd-dev"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"libsystemd0"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"libudev-dev"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"libudev1"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"systemd"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"systemd-container"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"systemd-coredump"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"systemd-journal-remote"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"systemd-sysv"},{"binary_version":"229-4ubuntu21.31+esm1","binary_name":"udev"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-33910.json"}},{"package":{"name":"systemd","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/systemd@237-3ubuntu10.49?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"237-3ubuntu10.49"}]}],"versions":["234-2ubuntu12","235-2ubuntu3","235-3ubuntu2","235-3ubuntu3","237-3ubuntu3","237-3ubuntu4","237-3ubuntu6","237-3ubuntu7","237-3ubuntu8","237-3ubuntu10","237-3ubuntu10.2","237-3ubuntu10.3","237-3ubuntu10.4","237-3ubuntu10.6","237-3ubuntu10.9","237-3ubuntu10.11","237-3ubuntu10.12","237-3ubuntu10.13","237-3ubuntu10.15","237-3ubuntu10.17","237-3ubuntu10.19","237-3ubuntu10.20","237-3ubuntu10.21","237-3ubuntu10.22","237-3ubuntu10.23","237-3ubuntu10.24","237-3ubuntu10.25","237-3ubuntu10.26","237-3ubuntu10.28","237-3ubuntu10.29","237-3ubuntu10.31","237-3ubuntu10.33","237-3ubuntu10.38","237-3ubuntu10.39","237-3ubuntu10.40","237-3ubuntu10.41","237-3ubuntu10.42","237-3ubuntu10.43","237-3ubuntu10.44","237-3ubuntu10.45","237-3ubuntu10.46","237-3ubuntu10.47","237-3ubuntu10.48"],"ecosystem_specific":{"binaries":[{"binary_version":"237-3ubuntu10.49","binary_name":"libnss-myhostname"},{"binary_version":"237-3ubuntu10.49","binary_name":"libnss-mymachines"},{"binary_version":"237-3ubuntu10.49","binary_name":"libnss-resolve"},{"binary_version":"237-3ubuntu10.49","binary_name":"libnss-systemd"},{"binary_version":"237-3ubuntu10.49","binary_name":"libpam-systemd"},{"binary_version":"237-3ubuntu10.49","binary_name":"libsystemd-dev"},{"binary_version":"237-3ubuntu10.49","binary_name":"libsystemd0"},{"binary_version":"237-3ubuntu10.49","binary_name":"libudev-dev"},{"binary_version":"237-3ubuntu10.49","binary_name":"libudev1"},{"binary_version":"237-3ubuntu10.49","binary_name":"systemd"},{"binary_version":"237-3ubuntu10.49","binary_name":"systemd-container"},{"binary_version":"237-3ubuntu10.49","binary_name":"systemd-coredump"},{"binary_version":"237-3ubuntu10.49","binary_name":"systemd-journal-remote"},{"binary_version":"237-3ubuntu10.49","binary_name":"systemd-sysv"},{"binary_version":"237-3ubuntu10.49","binary_name":"systemd-tests"},{"binary_version":"237-3ubuntu10.49","binary_name":"udev"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-33910.json"}},{"package":{"name":"systemd","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/systemd@245.4-4ubuntu3.10?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"245.4-4ubuntu3.10"}]}],"versions":["242-7ubuntu3","243-2ubuntu1","243-3ubuntu1","244-3ubuntu1","244.1-0ubuntu2","244.1-0ubuntu3","244.2-1ubuntu1","244.3-1ubuntu1","245.2-1ubuntu1","245.2-1ubuntu2","245.4-2ubuntu1","245.4-4ubuntu1","245.4-4ubuntu3","245.4-4ubuntu3.1","245.4-4ubuntu3.2","245.4-4ubuntu3.3","245.4-4ubuntu3.4","245.4-4ubuntu3.5","245.4-4ubuntu3.6","245.4-4ubuntu3.7"],"ecosystem_specific":{"binaries":[{"binary_version":"245.4-4ubuntu3.10","binary_name":"libnss-myhostname"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"libnss-mymachines"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"libnss-resolve"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"libnss-systemd"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"libpam-systemd"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"libsystemd-dev"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"libsystemd0"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"libudev-dev"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"libudev1"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"systemd"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"systemd-container"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"systemd-coredump"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"systemd-journal-remote"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"systemd-sysv"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"systemd-tests"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"systemd-timesyncd"},{"binary_version":"245.4-4ubuntu3.10","binary_name":"udev"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-33910.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}]}