{"id":"USN-5013-2","summary":"systemd vulnerabilities","details":"USN-5013-1 fixed several vulnerabilities in systemd. This update provides\nthe corresponding update for Ubuntu 16.04 ESM.\n\n\nOriginal advisory details:\n\n It was discovered that systemd incorrectly handled certain mount paths. A\n local attacker could possibly use this issue to cause systemd to crash,\n resulting in a denial of service. (CVE-2021-33910)\n\n Mitchell Frank discovered that systemd incorrectly handled DHCP FORCERENEW\n packets. A remote attacker could possibly use this issue to reconfigure\n servers. (CVE-2020-13529)\n","modified":"2026-05-20T16:03:08.342101896Z","published":"2021-07-20T17:36:52Z","related":["UBUNTU-CVE-2020-13529","UBUNTU-CVE-2021-33910"],"upstream":["CVE-2020-13529","CVE-2021-33910","UBUNTU-CVE-2020-13529","UBUNTU-CVE-2021-33910"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5013-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-13529"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-33910"}],"affected":[{"package":{"name":"systemd","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/systemd?arch=source&distro=esm-apps%2Fxenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"229-4ubuntu21.31+esm1"}]}],"versions":["225-1ubuntu9","227-2ubuntu1","227-2ubuntu2","228-1ubuntu2","228-2ubuntu1","228-2ubuntu2","228-3ubuntu1","228-4ubuntu1","228-4ubuntu2","228-5ubuntu1","228-5ubuntu2","228-5ubuntu3","228-6ubuntu1","229-1ubuntu2","229-1ubuntu4","229-2ubuntu1","229-3ubuntu1","229-3ubuntu2","229-4ubuntu1","229-4ubuntu4","229-4ubuntu5","229-4ubuntu6","229-4ubuntu7","229-4ubuntu8","229-4ubuntu10","229-4ubuntu11","229-4ubuntu12","229-4ubuntu13","229-4ubuntu16","229-4ubuntu17","229-4ubuntu19","229-4ubuntu20","229-4ubuntu21","229-4ubuntu21.1","229-4ubuntu21.2","229-4ubuntu21.3","229-4ubuntu21.4","229-4ubuntu21.5","229-4ubuntu21.6","229-4ubuntu21.8","229-4ubuntu21.9","229-4ubuntu21.10","229-4ubuntu21.15","229-4ubuntu21.16","229-4ubuntu21.17","229-4ubuntu21.19","229-4ubuntu21.21","229-4ubuntu21.22","229-4ubuntu21.23","229-4ubuntu21.27","229-4ubuntu21.28","229-4ubuntu21.29","229-4ubuntu21.31"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"systemd-coredump","binary_version":"229-4ubuntu21.31+esm1"},{"binary_name":"systemd","binary_version":"229-4ubuntu21.31+esm1"},{"binary_name":"libsystemd0","binary_version":"229-4ubuntu21.31+esm1"},{"binary_name":"systemd-container","binary_version":"229-4ubuntu21.31+esm1"},{"binary_name":"libnss-myhostname","binary_version":"229-4ubuntu21.31+esm1"},{"binary_name":"libudev1","binary_version":"229-4ubuntu21.31+esm1"},{"binary_name":"systemd-journal-remote","binary_version":"229-4ubuntu21.31+esm1"},{"binary_name":"libpam-systemd","binary_version":"229-4ubuntu21.31+esm1"},{"binary_name":"libnss-mymachines","binary_version":"229-4ubuntu21.31+esm1"},{"binary_name":"libnss-resolve","binary_version":"229-4ubuntu21.31+esm1"},{"binary_name":"systemd-sysv","binary_version":"229-4ubuntu21.31+esm1"},{"binary_name":"udev","binary_version":"229-4ubuntu21.31+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5013-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[]}}}],"schema_version":"1.7.5"}