First published: Fri Jul 22 2022(Updated: )
systemd could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free flaw due to the on_stream_io() function and dns_stream_complete() function in "resolved-dns-stream.c" not incrementing the reference counting for the DnsStream object. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/systemd | <0:219-78.el7_9.7 | 0:219-78.el7_9.7 |
redhat/systemd | <0:239-58.el8_6.4 | 0:239-58.el8_6.4 |
redhat/systemd | <0:239-18.el8_1.11 | 0:239-18.el8_1.11 |
redhat/systemd | <0:239-31.el8_2.9 | 0:239-31.el8_2.9 |
redhat/systemd | <0:239-45.el8_4.12 | 0:239-45.el8_4.12 |
IBM BM Security Guardium | <=11.3 | |
IBM Security Guardium | <=11.4 | |
IBM Security Guardium | <=11.5 | |
redhat/systemd | <240 | 240 |
Systemd Project Systemd | =240 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
Netapp H410s Firmware | ||
Netapp H410s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2022-2526 is critical.
CVE-2022-2526 occurs due to a use-after-free vulnerability in systemd.
The on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' are affected by CVE-2022-2526.
The versions affected by CVE-2022-2526 include systemd 240, 0:219-78.el7_9.7, 0:239-58.el8_6.4, 0:239-18.el8_1, 0:239-31.el8_2, and 0:239-45.el8_4.12.
To fix CVE-2022-2526, you need to update systemd to version 240 or apply the appropriate remedy provided by the package distributor.