vulnerability

Amazon Linux AMI 2: CVE-2022-2526: Security patch for systemd (ALAS-2022-1854)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Sep 9, 2022
Added
Oct 11, 2022
Modified
Jan 30, 2025

Description

A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.

Solutions

amazon-linux-ami-2-upgrade-libgudev1amazon-linux-ami-2-upgrade-libgudev1-develamazon-linux-ami-2-upgrade-systemdamazon-linux-ami-2-upgrade-systemd-debuginfoamazon-linux-ami-2-upgrade-systemd-develamazon-linux-ami-2-upgrade-systemd-journal-gatewayamazon-linux-ami-2-upgrade-systemd-libsamazon-linux-ami-2-upgrade-systemd-networkdamazon-linux-ami-2-upgrade-systemd-pythonamazon-linux-ami-2-upgrade-systemd-resolvedamazon-linux-ami-2-upgrade-systemd-sysv
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.