摘要:
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
安全等级: Low
公告ID: KylinSec-SA-2022-2054
发布日期: 2022年9月23日
关联CVE: CVE-2022-2526
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-2526 | KY3.4-4A | systemd | Unaffected |
CVE-2022-2526 | KY3.4-5 | systemd | Unaffected |
CVE-2022-2526 | KY3.5.1 | systemd | Unaffected |