systemd-resolved is susceptible to a Use After Free (UAF) vulnerability in how DNS packets are handled. Functions such as on_stream_io and dns_stream_complete in resolved-dns-stream.c do not increment the reference counting for the DnsStream object they are working on. Other functions and callbacks called there (e.g. on_llmnr_stream_packet) could unreference the DnsStream object, causing a Use After Free when the reference is still used later. Upstream patch: https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f27c
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:6163 https://access.redhat.com/errata/RHSA-2022:6163
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:6162 https://access.redhat.com/errata/RHSA-2022:6162
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:6161 https://access.redhat.com/errata/RHSA-2022:6161
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:6160 https://access.redhat.com/errata/RHSA-2022:6160
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:6206 https://access.redhat.com/errata/RHSA-2022:6206
Created systemd tracking bugs for this issue: Affects: fedora-all [bug 2123211]
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2526
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2022:6551 https://access.redhat.com/errata/RHSA-2022:6551