Name | CVE-2022-3821 |
Description | An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
systemd (PTS) | buster | 241-7~deb10u8 | vulnerable |
buster (security) | 241-7~deb10u9 | vulnerable | |
bullseye | 247.3-7+deb11u1 | vulnerable | |
bookworm, sid | 252.6-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
systemd | source | (unstable) | 251.3-1 |
[bullseye] - systemd <no-dsa> (Minor issue)
[buster] - systemd <postponed> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=2139327
https://github.com/systemd/systemd/issues/23928
https://github.com/systemd/systemd/pull/23933
https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e (v252-rc1)
https://github.com/systemd/systemd-stable/commit/72d4c15a946d20143cd4c6783c802124bc894dc7 (v251.3)