vulnerability
Oracle Linux: CVE-2022-2526: ELSA-2022-6206: systemd security update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | 08/19/2022 | 08/26/2022 | 01/23/2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
08/19/2022
Added
08/26/2022
Modified
01/23/2025
Description
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
Solution(s)
oracle-linux-upgrade-libgudev1oracle-linux-upgrade-libgudev1-develoracle-linux-upgrade-systemdoracle-linux-upgrade-systemd-containeroracle-linux-upgrade-systemd-develoracle-linux-upgrade-systemd-journal-gatewayoracle-linux-upgrade-systemd-journal-remoteoracle-linux-upgrade-systemd-libsoracle-linux-upgrade-systemd-networkdoracle-linux-upgrade-systemd-pamoracle-linux-upgrade-systemd-pythonoracle-linux-upgrade-systemd-resolvedoracle-linux-upgrade-systemd-sysvoracle-linux-upgrade-systemd-testsoracle-linux-upgrade-systemd-udev

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.