First published: Wed Aug 24 2022(Updated: )
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.<br>Security Fix(es):<br><li> systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/systemd | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-container | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-container-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-debugsource | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-devel | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-journal-remote | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-journal-remote-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-libs | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-libs-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-pam | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-pam-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-tests | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-tests-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-udev | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-udev-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-container | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-container | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-container-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-container-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-debugsource | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-debugsource | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-devel | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-devel | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-journal-remote | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-journal-remote-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-journal-remote-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-libs | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-libs | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-libs-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-libs-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-pam | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-pam-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-pam-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-tests | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-tests-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-tests-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-udev | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-udev-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
redhat/systemd-udev-debuginfo | <239-18.el8_1.11 | 239-18.el8_1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:6163 is classified as important.
To fix RHSA-2022:6163, you should upgrade the affected systemd packages to version 239-18.el8_1.11.
RHSA-2022:6163 affects various Red Hat Enterprise Linux 8 systems that utilize the systemd package.
There is no official workaround for RHSA-2022:6163; updating the packages is necessary to resolve the vulnerability.
RHSA-2022:6163 was released on December 14, 2022.