{"uuid": "7f6b98e2-b3b9-4b09-b9e7-096f6eae1db7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3821", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14543", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3821\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.\n\ud83d\udccf Published: 2022-11-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T18:12:20.028Z\n\ud83d\udd17 References:\n1. https://bugzilla.redhat.com/show_bug.cgi?id=2139327\n2. https://github.com/systemd/systemd/issues/23928\n3. https://github.com/systemd/systemd/pull/23933\n4. https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e\n5. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/\n6. https://security.gentoo.org/glsa/202305-15\n7. https://lists.debian.org/debian-lts-announce/2023/06/msg00036.html", "creation_timestamp": "2025-05-02T18:19:34.000000Z"}