GLSA-202305-15 : systemd: Multiple Vulnerabilities

medium Nessus Plugin ID 175054


The remote host is affected by the vulnerability described in GLSA-202305-15 (systemd: Multiple Vulnerabilities)

- A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp. (CVE-2021-3997)

- An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service. (CVE-2022-3821)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


All systemd users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot
--verbose >=sys-apps/systemd-251.3 All systemd-utils users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose >=sys-apps/systemd-utils-251.3 Gentoo has discontinued support for sys-apps/systemd-tmpfiles, sys-boot/systemd-boot, and sys-fs/udev. See the 2022-04-19-systemd- utils news item. Users should unmerge it in favor of sys-apps/systemd-utils on non-systemd systems: # emerge
--ask --depclean --verbose sys-apps/systemd-tmpfiles sys-boot/systemd-boot sys-fs/udev # emerge --ask
--verbose --oneshot >=sys-apps/systemd-utils-251.3

See Also

Plugin Details

Severity: Medium

ID: 175054

File Name: gentoo_GLSA-202305-15.nasl

Version: 1.0

Type: local

Published: 5/3/2023

Updated: 5/3/2023

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 4.4


Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2022-3821


Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:systemd, p-cpe:/a:gentoo:linux:systemd-utils, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/3/2023

Vulnerability Publication Date: 3/8/2022

Reference Information

CVE: CVE-2021-3997, CVE-2022-3821