Vulnerability Description
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Systemd Project | Systemd | 240 |
| Netapp | Active Iq Unified Manager | - |
| Netapp | H300S Firmware | - |
| Netapp | H300S | - |
| Netapp | H500S Firmware | - |
| Netapp | H500S | - |
| Netapp | H700S Firmware | - |
| Netapp | H700S | - |
| Netapp | H410S Firmware | - |
| Netapp | H410S | - |
Related Weaknesses (CWE)
References
- https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f2PatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20221111-0005/Third Party Advisory
- https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f2PatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20221111-0005/Third Party Advisory
FAQ
What is CVE-2022-2526?
CVE-2022-2526 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference c...
How severe is CVE-2022-2526?
CVE-2022-2526 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-2526?
Check the references section above for vendor advisories and patch information. Affected products include: Systemd Project Systemd, Netapp Active Iq Unified Manager, Netapp H300S Firmware, Netapp H300S, Netapp H500S Firmware.