Bug 1984299

Summary: CVE-2021-33910 systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash [rhel-9.0]
Product: Red Hat Enterprise Linux 9 Reporter: Jan Macku <jamacku>
Component: systemdAssignee: Jan Macku <jamacku>
Status: CLOSED CURRENTRELEASE QA Contact: Frantisek Sumsal <fsumsal>
Severity: high Docs Contact:
Priority: urgent    
Version: 9.0CC: fsumsal, jamacku, lnykryn, lpoetter, msekleta, rschiron, security-response-team, systemd-maint-list, zjedrzej
Target Milestone: betaKeywords: Security, SecurityTracking, Triaged
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: systemd-249-2.el9 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: 1974700 Environment:
Last Closed: 2021-12-07 21:57:54 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1970887    

Comment 1 Lukáš Nykrýn 2021-07-21 10:11:10 UTC
fix merged to github main branch -> https://github.com/redhat-plumbers/systemd-rhel9/pull/14

Comment 2 Mauro Matteo Cascella 2021-07-21 17:29:31 UTC
*** Bug 1979859 has been marked as a duplicate of this bug. ***