Skip to content

Critical Systemd Vulnerability Causes Kernel Panic, Patch Now

Unpatched systemd versions risk kernel panics. Apply the patch immediately to prevent potential disruptions.

In this image, we can see an aircraft on the platform. Here we can see few people, shed, trees....
In this image, we can see an aircraft on the platform. Here we can see few people, shed, trees. Background there is a cloudy sky.

Critical Systemd Vulnerability Causes Kernel Panic, Patch Now

A critical vulnerability in systemd, discovered by Qualys, allows unprivileged users to cause a denial of service via kernel panic. The issue affects all versions since April 2015.

The vulnerability, CVE-2021-33910, stems from a flawed strdupa() function in systemd that allocates memory on the stack. If the total path length exceeds 8MB, it can lead to a stack exhaustion, crashing systemd and causing a kernel panic. Qualys Research Team found this issue, which was first introduced in systemd v220 (April 2015).

Qualys advises users to apply patches immediately to mitigate the risk. Non-customers can start a free Qualys VMDR trial to identify vulnerable assets, while customers can search for CVE-2021-33910 to locate affected systems. There are no known workarounds for this vulnerability.

The stack exhaustion denial-of-service vulnerability in systemd, discovered by Qualys, affects all versions from April 2015 onwards. Users are urged to apply patches promptly to prevent potential disruptions. Further information can be obtained through Qualys.

Read also:

Latest