Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2022-6206

Опубликовано: 29 авг. 2022
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2022-6206: systemd security update (IMPORTANT)

[239-58.0.1.4]

  • Disable unprivileged BPF by default [Orabug: 32870980]
  • backport upstream pstore tmpfiles patch [Orabug: 31420486]
  • udev rules: fix memory hot add and remove [Orabug: 31310273]
  • fix to enable systemd-pstore.service [Orabug: 30951066]
  • journal: change support URL shown in the catalog entries [Orabug: 30853009]
  • fix to generate systemd-pstore.service file [Orabug: 30230056]
  • fix _netdev is missing for iscsi entry in /etc/fstab (tony.l.lam@oracle.com) [Orabug: 25897792]
  • set 'RemoveIPC=no' in logind.conf as default for OL7.2 [Orabug: 22224874]
  • allow dm remove ioctl to co-operate with UEK3 (Vaughan Cao) [Orabug: 18467469]
  • add hv dynamic memory support (Jerry Snitselaar) [Orabug: 18621475]
  • Backport upstream patches for the new systemd-pstore tool (Eric DeVolder) [OraBug: 30230056]

[239-58.4]

  • resolved: pin stream while calling callbacks for it (#2110548)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

systemd

239-58.0.1.el8_6.4

systemd-container

239-58.0.1.el8_6.4

systemd-devel

239-58.0.1.el8_6.4

systemd-journal-remote

239-58.0.1.el8_6.4

systemd-libs

239-58.0.1.el8_6.4

systemd-pam

239-58.0.1.el8_6.4

systemd-tests

239-58.0.1.el8_6.4

systemd-udev

239-58.0.1.el8_6.4

Oracle Linux x86_64

systemd

239-58.0.1.el8_6.4

systemd-container

239-58.0.1.el8_6.4

systemd-devel

239-58.0.1.el8_6.4

systemd-journal-remote

239-58.0.1.el8_6.4

systemd-libs

239-58.0.1.el8_6.4

systemd-pam

239-58.0.1.el8_6.4

systemd-tests

239-58.0.1.el8_6.4

systemd-udev

239-58.0.1.el8_6.4

Связанные CVE

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 3 года назад

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

CVSS3: 9.8
redhat
почти 3 года назад

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

CVSS3: 9.8
nvd
почти 3 года назад

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

CVSS3: 9.8
debian
почти 3 года назад

A use-after-free vulnerability was found in systemd. This issue occurs ...

CVSS3: 9.8
redos
около 1 года назад

Уязвимость systemd