发布时间: 2022年9月23日
修改时间: 2022年9月23日
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
NVD | openEuler | |
---|---|---|
Confidentiality | High | None |
Attack Vector | Network | Network |
CVSS评分 | 9.8 | 5.9 |
Attack Complexity | Low | High |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | High | None |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-2054 | A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later. | 2022年9月23日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | systemd | Unaffected |
KY3.4-5 | systemd | Unaffected |
KY3.5.1 | systemd | Unaffected |