Описание
ELSA-2022-6206: systemd security update (IMPORTANT)
[239-58.0.1.4]
- Disable unprivileged BPF by default [Orabug: 32870980]
- backport upstream pstore tmpfiles patch [Orabug: 31420486]
- udev rules: fix memory hot add and remove [Orabug: 31310273]
- fix to enable systemd-pstore.service [Orabug: 30951066]
- journal: change support URL shown in the catalog entries [Orabug: 30853009]
- fix to generate systemd-pstore.service file [Orabug: 30230056]
- fix _netdev is missing for iscsi entry in /etc/fstab (tony.l.lam@oracle.com) [Orabug: 25897792]
- set 'RemoveIPC=no' in logind.conf as default for OL7.2 [Orabug: 22224874]
- allow dm remove ioctl to co-operate with UEK3 (Vaughan Cao) [Orabug: 18467469]
- add hv dynamic memory support (Jerry Snitselaar) [Orabug: 18621475]
- Backport upstream patches for the new systemd-pstore tool (Eric DeVolder) [OraBug: 30230056]
[239-58.4]
- resolved: pin stream while calling callbacks for it (#2110548)
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
systemd
239-58.0.1.el8_6.4
systemd-container
239-58.0.1.el8_6.4
systemd-devel
239-58.0.1.el8_6.4
systemd-journal-remote
239-58.0.1.el8_6.4
systemd-libs
239-58.0.1.el8_6.4
systemd-pam
239-58.0.1.el8_6.4
systemd-tests
239-58.0.1.el8_6.4
systemd-udev
239-58.0.1.el8_6.4
Oracle Linux x86_64
systemd
239-58.0.1.el8_6.4
systemd-container
239-58.0.1.el8_6.4
systemd-devel
239-58.0.1.el8_6.4
systemd-journal-remote
239-58.0.1.el8_6.4
systemd-libs
239-58.0.1.el8_6.4
systemd-pam
239-58.0.1.el8_6.4
systemd-tests
239-58.0.1.el8_6.4
systemd-udev
239-58.0.1.el8_6.4
Связанные CVE
Связанные уязвимости
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
A use-after-free vulnerability was found in systemd. This issue occurs ...