Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-2526

Опубликовано: 09 сент. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.8

Описание

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

РелизСтатусПримечание
bionic

released

237-3ubuntu10.54
devel

not-affected

251.2-2ubuntu2
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

released

237-3ubuntu10.54
esm-infra/focal

not-affected

245.4-4ubuntu3.17
esm-infra/xenial

not-affected

code not present
focal

not-affected

245.4-4ubuntu3.17
jammy

not-affected

249.11-0ubuntu3.4
trusty

ignored

end of standard support
trusty/esm

not-affected

code not present

Показывать по

EPSS

Процентиль: 48%
0.00247
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
больше 3 лет назад

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

CVSS3: 9.8
nvd
около 3 лет назад

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

CVSS3: 9.8
debian
около 3 лет назад

A use-after-free vulnerability was found in systemd. This issue occurs ...

CVSS3: 9.8
redos
больше 1 года назад

Уязвимость systemd

rocky
больше 3 лет назад

Important: systemd security update

EPSS

Процентиль: 48%
0.00247
Низкий

9.8 Critical

CVSS3