Your submission was sent successfully! Close

CVE-2022-2526

Published: 24 August 2022

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
systemd
Launchpad, Ubuntu, Debian
bionic
Released (237-3ubuntu10.56)
focal Not vulnerable
(245.4-4ubuntu3.17)
jammy Not vulnerable
(249.11-0ubuntu3.4)
trusty Not vulnerable
(code not present)
upstream
Released (240-1)
xenial Not vulnerable
(code not present)
Patches:
upstream: https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f27c (v240)