Headline
RHSA-2022:6162: Red Hat Security Advisory: systemd security update
An update for systemd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
Synopsis
Important: systemd security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for systemd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
- systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.2 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
Fixes
- BZ - 2109926 - CVE-2022-2526 systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2
SRPM
systemd-239-31.el8_2.9.src.rpm
SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1
x86_64
systemd-239-31.el8_2.9.i686.rpm
SHA-256: 980b9cee8a7a68c17584fff847d47ea59749f0315b47264c7ca28f3a51208ba6
systemd-239-31.el8_2.9.x86_64.rpm
SHA-256: 5017059b49b046a5af96fe622c26360e1fc0cdecd88ad38c12ee7b8d6230639f
systemd-container-239-31.el8_2.9.i686.rpm
SHA-256: 8fe010f6a57cf8fb00f9f271df2285f2657a0496f18342748b4612edbaf20edf
systemd-container-239-31.el8_2.9.x86_64.rpm
SHA-256: 3c9d75f16bba60fbcf758f814a866c6d88fef12e666980a844a7bb03bb5a4244
systemd-container-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 9e1eaf9b97ee067df7bd7ab8fbe98238b7c6a8eca3fe036fea381b39da3ee1ba
systemd-container-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: e3d98ceb86317ec6128dbce29a79f25896277fae2ed2f73026292a36d24a5a5a
systemd-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 28f3db18ab2b734f3f3614788a2fb273e0d76685a84996df100fe3908b2f8170
systemd-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 91b10ac27ba67ab69f93588e6648bd3c9708dca11c53fda7208069be25eb7023
systemd-debugsource-239-31.el8_2.9.i686.rpm
SHA-256: a8c06912ad7d1fa8966cc9bdd23072b0d66c35bdaad5952a4a405ac58c12ccde
systemd-debugsource-239-31.el8_2.9.x86_64.rpm
SHA-256: 51d188fe3012d40b2987844b0be6df0b152bb6e33f95551f9db0aa3d34ca2a46
systemd-devel-239-31.el8_2.9.i686.rpm
SHA-256: 944f9b7bea2dc32ff5535f25da9fbeaef0618de9ecc3a4cd45b2a8b3a2149330
systemd-devel-239-31.el8_2.9.x86_64.rpm
SHA-256: b9ac84a108574e467bab62b376837eaa7ab817ae3475e78e032ed2fb28392b00
systemd-journal-remote-239-31.el8_2.9.x86_64.rpm
SHA-256: fd67d87f6df794704d0a21a02b893feb738d44d0fd015e07ea0fb1eb21aee0ea
systemd-journal-remote-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 3cc6d3ace7d574ff19f8c52d4dc215be56025391093daf63227e2120c89c4e72
systemd-journal-remote-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 5fddeca31a41ea1fcf2fbadd57d2f8f0469f6f72ca6c46a9f289e8d1c9019fdf
systemd-libs-239-31.el8_2.9.i686.rpm
SHA-256: 340085884444b289d9768b1d3af927da56dd3f63f4a0a5d8cafb8a544675267b
systemd-libs-239-31.el8_2.9.x86_64.rpm
SHA-256: 7c5ef8f463e3476945a47ba4f2b0516d9378576d685c8a8c6f90482a9bb4d0fc
systemd-libs-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: c45788e8f29d2a995dd68022dc517d825e51bad38542587191ab9fe600214089
systemd-libs-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 80456bf449050eaa4f879d86dbc0c8896dad62558458eae5c980bba60391b7d4
systemd-pam-239-31.el8_2.9.x86_64.rpm
SHA-256: d01523d52f6c6c24e395d51f2c01c54aeadbaa6bd07205e94f48486622713a4f
systemd-pam-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: bb2960e08225c146d2c6d75462941a310e9e8113055983aa867f844043acf9dc
systemd-pam-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 1147797c47143f9bb7bda7ae9708c553adf2afd216c14d224149e752828246a9
systemd-tests-239-31.el8_2.9.x86_64.rpm
SHA-256: 5f0bcd48c40c63e9f38f08160ee884c149a6cf5072f71741a1f8096824e04224
systemd-tests-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: dc9e08d7b6c77794c746b068936e6f728db753340be73bd67bf7eb95a3556988
systemd-tests-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 4937869bf8fd91b8f33ab382b0e105026b60e9b3af47ba24a25ddb1843eab0be
systemd-udev-239-31.el8_2.9.x86_64.rpm
SHA-256: 10a035322e4e800e88f05c3d66ff78b50c76a031a83392bb9e4bc3da32022c94
systemd-udev-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 443f0820fe7c4cfd2c648d2909283ffc5d8353aae946f967d2b8eb1ed0b85c0d
systemd-udev-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 3aaa671dce4ff696a4295a8fc3c75f73d28fd43623778e9a7c7353fc38c5a615
Red Hat Enterprise Linux Server - AUS 8.2
SRPM
systemd-239-31.el8_2.9.src.rpm
SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1
x86_64
systemd-239-31.el8_2.9.i686.rpm
SHA-256: 980b9cee8a7a68c17584fff847d47ea59749f0315b47264c7ca28f3a51208ba6
systemd-239-31.el8_2.9.x86_64.rpm
SHA-256: 5017059b49b046a5af96fe622c26360e1fc0cdecd88ad38c12ee7b8d6230639f
systemd-container-239-31.el8_2.9.i686.rpm
SHA-256: 8fe010f6a57cf8fb00f9f271df2285f2657a0496f18342748b4612edbaf20edf
systemd-container-239-31.el8_2.9.x86_64.rpm
SHA-256: 3c9d75f16bba60fbcf758f814a866c6d88fef12e666980a844a7bb03bb5a4244
systemd-container-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 9e1eaf9b97ee067df7bd7ab8fbe98238b7c6a8eca3fe036fea381b39da3ee1ba
systemd-container-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: e3d98ceb86317ec6128dbce29a79f25896277fae2ed2f73026292a36d24a5a5a
systemd-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 28f3db18ab2b734f3f3614788a2fb273e0d76685a84996df100fe3908b2f8170
systemd-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 91b10ac27ba67ab69f93588e6648bd3c9708dca11c53fda7208069be25eb7023
systemd-debugsource-239-31.el8_2.9.i686.rpm
SHA-256: a8c06912ad7d1fa8966cc9bdd23072b0d66c35bdaad5952a4a405ac58c12ccde
systemd-debugsource-239-31.el8_2.9.x86_64.rpm
SHA-256: 51d188fe3012d40b2987844b0be6df0b152bb6e33f95551f9db0aa3d34ca2a46
systemd-devel-239-31.el8_2.9.i686.rpm
SHA-256: 944f9b7bea2dc32ff5535f25da9fbeaef0618de9ecc3a4cd45b2a8b3a2149330
systemd-devel-239-31.el8_2.9.x86_64.rpm
SHA-256: b9ac84a108574e467bab62b376837eaa7ab817ae3475e78e032ed2fb28392b00
systemd-journal-remote-239-31.el8_2.9.x86_64.rpm
SHA-256: fd67d87f6df794704d0a21a02b893feb738d44d0fd015e07ea0fb1eb21aee0ea
systemd-journal-remote-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 3cc6d3ace7d574ff19f8c52d4dc215be56025391093daf63227e2120c89c4e72
systemd-journal-remote-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 5fddeca31a41ea1fcf2fbadd57d2f8f0469f6f72ca6c46a9f289e8d1c9019fdf
systemd-libs-239-31.el8_2.9.i686.rpm
SHA-256: 340085884444b289d9768b1d3af927da56dd3f63f4a0a5d8cafb8a544675267b
systemd-libs-239-31.el8_2.9.x86_64.rpm
SHA-256: 7c5ef8f463e3476945a47ba4f2b0516d9378576d685c8a8c6f90482a9bb4d0fc
systemd-libs-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: c45788e8f29d2a995dd68022dc517d825e51bad38542587191ab9fe600214089
systemd-libs-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 80456bf449050eaa4f879d86dbc0c8896dad62558458eae5c980bba60391b7d4
systemd-pam-239-31.el8_2.9.x86_64.rpm
SHA-256: d01523d52f6c6c24e395d51f2c01c54aeadbaa6bd07205e94f48486622713a4f
systemd-pam-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: bb2960e08225c146d2c6d75462941a310e9e8113055983aa867f844043acf9dc
systemd-pam-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 1147797c47143f9bb7bda7ae9708c553adf2afd216c14d224149e752828246a9
systemd-tests-239-31.el8_2.9.x86_64.rpm
SHA-256: 5f0bcd48c40c63e9f38f08160ee884c149a6cf5072f71741a1f8096824e04224
systemd-tests-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: dc9e08d7b6c77794c746b068936e6f728db753340be73bd67bf7eb95a3556988
systemd-tests-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 4937869bf8fd91b8f33ab382b0e105026b60e9b3af47ba24a25ddb1843eab0be
systemd-udev-239-31.el8_2.9.x86_64.rpm
SHA-256: 10a035322e4e800e88f05c3d66ff78b50c76a031a83392bb9e4bc3da32022c94
systemd-udev-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 443f0820fe7c4cfd2c648d2909283ffc5d8353aae946f967d2b8eb1ed0b85c0d
systemd-udev-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 3aaa671dce4ff696a4295a8fc3c75f73d28fd43623778e9a7c7353fc38c5a615
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2
SRPM
systemd-239-31.el8_2.9.src.rpm
SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1
s390x
systemd-239-31.el8_2.9.s390x.rpm
SHA-256: 9d3dd7d6ab6a1ba47db3a6aa09d4a85481f5730b19468371214295b2d74d6327
systemd-container-239-31.el8_2.9.s390x.rpm
SHA-256: de8d2f5ab7c55a79407bf43dd10a66f400a0e4fbcbd2556e08293d84090060b5
systemd-container-debuginfo-239-31.el8_2.9.s390x.rpm
SHA-256: d27f69356c5289a1f5e5dcc0f07e783ce109b794a6ae2c6eb73c7c421ac9b459
systemd-debuginfo-239-31.el8_2.9.s390x.rpm
SHA-256: 694cf1b5c84a4bd993f7de0177cc37473ca44175350c60cae2146d6b6dc993ea
systemd-debugsource-239-31.el8_2.9.s390x.rpm
SHA-256: 85ffaf648342914e04a287a74a79f4d4f427b5da71845e1fdee450f3fe60cbc7
systemd-devel-239-31.el8_2.9.s390x.rpm
SHA-256: ec9c5f2f76cf01d43aea40d92012b3b4ecf8cb25878ee85b48d115dcf5e7e1f1
systemd-journal-remote-239-31.el8_2.9.s390x.rpm
SHA-256: f8c1523a86e8d3f1b07f48fe99a3f3d32d3e3904f75d6896fac2ae36c7c64958
systemd-journal-remote-debuginfo-239-31.el8_2.9.s390x.rpm
SHA-256: 6018031ee7ce54216ebe25651cb71dd2bda0cb21fc4e0cc57d73d12a93af1a53
systemd-libs-239-31.el8_2.9.s390x.rpm
SHA-256: 3ccab5ec6e6f92f144f3b51b829857c6a86a42904dbf3ced098fb1a117bb93f6
systemd-libs-debuginfo-239-31.el8_2.9.s390x.rpm
SHA-256: d2b52369348c9b9e57e41e21dc5121441c61d9f866862a9fb40e0819b74bac74
systemd-pam-239-31.el8_2.9.s390x.rpm
SHA-256: 93818bf2eba2ffad266cdab18b92f7e3992ae79c217ef2d0079d0ecf85a586c2
systemd-pam-debuginfo-239-31.el8_2.9.s390x.rpm
SHA-256: eb573287b0bfcd916e94e38612f54ed7fbba2628853addd7f04eb56cd3499503
systemd-tests-239-31.el8_2.9.s390x.rpm
SHA-256: 55a716c1551c2b13dbc0eacc3c2c65d4413a5afdb531a60dcaeb11ab13111e50
systemd-tests-debuginfo-239-31.el8_2.9.s390x.rpm
SHA-256: d92dcfb9f31c552635929eca6291ca4ae81040aa32bddd05b3646f8855a7640e
systemd-udev-239-31.el8_2.9.s390x.rpm
SHA-256: dd70f7772cec528c27be109ede849acede6abf843ded30e4eb5b2230adfaacb2
systemd-udev-debuginfo-239-31.el8_2.9.s390x.rpm
SHA-256: 26da402d0a10f5f488ae0f22162c659417b22628d31f7ed042244f35d592597e
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2
SRPM
systemd-239-31.el8_2.9.src.rpm
SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1
ppc64le
systemd-239-31.el8_2.9.ppc64le.rpm
SHA-256: 8ff22e8f673367b1e08b2666357848c51f34ba4e90b84e6cafeb66c1fa7b76c8
systemd-container-239-31.el8_2.9.ppc64le.rpm
SHA-256: 1dc570ee245926cb4c8cf7f720d19591cb891eb36ea6ddb388c86e720bf64ef3
systemd-container-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: d63ad98e413f0224693528e425a143202d8af8d4c732ce17e9e96d8fda1bf6c9
systemd-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: 1ed58ad1bfcd0d08756b97254044a020dca1597d1d286fa16c2ecbb3c6fbb425
systemd-debugsource-239-31.el8_2.9.ppc64le.rpm
SHA-256: 38a5aed9862e33b41face9ce5876307a1c80614c58a3d606306c3c79f4c130fd
systemd-devel-239-31.el8_2.9.ppc64le.rpm
SHA-256: 6fe75b7f749d3eb5f686de1bf7b838f9b22f6d523a1a444bd20db0ea769bf745
systemd-journal-remote-239-31.el8_2.9.ppc64le.rpm
SHA-256: 8aabbc7fa599bc8360b2aefa743b8eb2421ee7019791694efb3db601c085453f
systemd-journal-remote-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: e1b29ac9d9b9dfbf6bdd2c4eed4e5e2a2441e4001ad03552568dee4016682d1c
systemd-libs-239-31.el8_2.9.ppc64le.rpm
SHA-256: 3b220a07434eaab8edeffe48fbf82b7673ecc04df2b315f0e7548f51a2d020e0
systemd-libs-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: afbbdc1ed5b59690458c9b162358f3bcde5751b8cef154861b545ebcc4c2c5b9
systemd-pam-239-31.el8_2.9.ppc64le.rpm
SHA-256: 7f67dfcdee22ef15221ccc524f27332a320f1b078be8926148f5b9e124c5fb1f
systemd-pam-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: 709eaf32a1aa5c5a57743e882b78e85836ff45cd6a4cff10b1ae6fad6b4cc741
systemd-tests-239-31.el8_2.9.ppc64le.rpm
SHA-256: c9478556b70a10d5aedae46151d80b6e4f3ec5a4f4f0393d5626676d4eddeeb7
systemd-tests-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: 5377d284d0ea66eead967ad66eab1f985f64cf6e5c34be2d31196cff4b3b0c02
systemd-udev-239-31.el8_2.9.ppc64le.rpm
SHA-256: c7ff62f40882f28a942a6b82531df6713e58111ce9b109210639be53a65c397a
systemd-udev-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: 4f792c980a82bfaed78e6087733c81c94773331bab3702034c917db29a689bdc
Red Hat Enterprise Linux Server - TUS 8.2
SRPM
systemd-239-31.el8_2.9.src.rpm
SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1
x86_64
systemd-239-31.el8_2.9.i686.rpm
SHA-256: 980b9cee8a7a68c17584fff847d47ea59749f0315b47264c7ca28f3a51208ba6
systemd-239-31.el8_2.9.x86_64.rpm
SHA-256: 5017059b49b046a5af96fe622c26360e1fc0cdecd88ad38c12ee7b8d6230639f
systemd-container-239-31.el8_2.9.i686.rpm
SHA-256: 8fe010f6a57cf8fb00f9f271df2285f2657a0496f18342748b4612edbaf20edf
systemd-container-239-31.el8_2.9.x86_64.rpm
SHA-256: 3c9d75f16bba60fbcf758f814a866c6d88fef12e666980a844a7bb03bb5a4244
systemd-container-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 9e1eaf9b97ee067df7bd7ab8fbe98238b7c6a8eca3fe036fea381b39da3ee1ba
systemd-container-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: e3d98ceb86317ec6128dbce29a79f25896277fae2ed2f73026292a36d24a5a5a
systemd-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 28f3db18ab2b734f3f3614788a2fb273e0d76685a84996df100fe3908b2f8170
systemd-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 91b10ac27ba67ab69f93588e6648bd3c9708dca11c53fda7208069be25eb7023
systemd-debugsource-239-31.el8_2.9.i686.rpm
SHA-256: a8c06912ad7d1fa8966cc9bdd23072b0d66c35bdaad5952a4a405ac58c12ccde
systemd-debugsource-239-31.el8_2.9.x86_64.rpm
SHA-256: 51d188fe3012d40b2987844b0be6df0b152bb6e33f95551f9db0aa3d34ca2a46
systemd-devel-239-31.el8_2.9.i686.rpm
SHA-256: 944f9b7bea2dc32ff5535f25da9fbeaef0618de9ecc3a4cd45b2a8b3a2149330
systemd-devel-239-31.el8_2.9.x86_64.rpm
SHA-256: b9ac84a108574e467bab62b376837eaa7ab817ae3475e78e032ed2fb28392b00
systemd-journal-remote-239-31.el8_2.9.x86_64.rpm
SHA-256: fd67d87f6df794704d0a21a02b893feb738d44d0fd015e07ea0fb1eb21aee0ea
systemd-journal-remote-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 3cc6d3ace7d574ff19f8c52d4dc215be56025391093daf63227e2120c89c4e72
systemd-journal-remote-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 5fddeca31a41ea1fcf2fbadd57d2f8f0469f6f72ca6c46a9f289e8d1c9019fdf
systemd-libs-239-31.el8_2.9.i686.rpm
SHA-256: 340085884444b289d9768b1d3af927da56dd3f63f4a0a5d8cafb8a544675267b
systemd-libs-239-31.el8_2.9.x86_64.rpm
SHA-256: 7c5ef8f463e3476945a47ba4f2b0516d9378576d685c8a8c6f90482a9bb4d0fc
systemd-libs-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: c45788e8f29d2a995dd68022dc517d825e51bad38542587191ab9fe600214089
systemd-libs-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 80456bf449050eaa4f879d86dbc0c8896dad62558458eae5c980bba60391b7d4
systemd-pam-239-31.el8_2.9.x86_64.rpm
SHA-256: d01523d52f6c6c24e395d51f2c01c54aeadbaa6bd07205e94f48486622713a4f
systemd-pam-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: bb2960e08225c146d2c6d75462941a310e9e8113055983aa867f844043acf9dc
systemd-pam-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 1147797c47143f9bb7bda7ae9708c553adf2afd216c14d224149e752828246a9
systemd-tests-239-31.el8_2.9.x86_64.rpm
SHA-256: 5f0bcd48c40c63e9f38f08160ee884c149a6cf5072f71741a1f8096824e04224
systemd-tests-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: dc9e08d7b6c77794c746b068936e6f728db753340be73bd67bf7eb95a3556988
systemd-tests-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 4937869bf8fd91b8f33ab382b0e105026b60e9b3af47ba24a25ddb1843eab0be
systemd-udev-239-31.el8_2.9.x86_64.rpm
SHA-256: 10a035322e4e800e88f05c3d66ff78b50c76a031a83392bb9e4bc3da32022c94
systemd-udev-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 443f0820fe7c4cfd2c648d2909283ffc5d8353aae946f967d2b8eb1ed0b85c0d
systemd-udev-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 3aaa671dce4ff696a4295a8fc3c75f73d28fd43623778e9a7c7353fc38c5a615
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2
SRPM
systemd-239-31.el8_2.9.src.rpm
SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1
aarch64
systemd-239-31.el8_2.9.aarch64.rpm
SHA-256: 5a79e6371a89fc0ba60cc9fd510395d66bbda97bfc2f5af341f11780aad9fabb
systemd-container-239-31.el8_2.9.aarch64.rpm
SHA-256: 2f3be7c9e7c0928b52955e60d9e47d0876242284eaecdcf66bb2c8f1b36589c6
systemd-container-debuginfo-239-31.el8_2.9.aarch64.rpm
SHA-256: 4c465e33091bcf44aa77855dc6b88ee728bda0d3c853fb1c1ca36d35815070ac
systemd-debuginfo-239-31.el8_2.9.aarch64.rpm
SHA-256: 37402443d06dab679b1d33467d83f0a783b0fee46d89f5ab72fe7c02e318954f
systemd-debugsource-239-31.el8_2.9.aarch64.rpm
SHA-256: 0167ecf04ff7ac27338c4e1fcb2495ff1e798f5a3cf0f32b0c09512c8e198dbe
systemd-devel-239-31.el8_2.9.aarch64.rpm
SHA-256: 5f9ff44b59eff4ae162895ca358883152803c98ce1160414ef8c554a8bd829df
systemd-journal-remote-239-31.el8_2.9.aarch64.rpm
SHA-256: 5566979f91b3bb8d699d7dde1ed4d96c91ce031870fbf8dfc990b1bd689a0be5
systemd-journal-remote-debuginfo-239-31.el8_2.9.aarch64.rpm
SHA-256: 6627fcc316e618cee3031c838d1a7a18514f5ac8daedd254c9abef6d03ba419f
systemd-libs-239-31.el8_2.9.aarch64.rpm
SHA-256: b7786f7171f01846e67d5caaea398a3efd33ac05a22ef62d0e43e97001cb060c
systemd-libs-debuginfo-239-31.el8_2.9.aarch64.rpm
SHA-256: c8b7e93cf73b5be2a65b0088a7c64f92045611d32bf415f0c1dde9533388ee4d
systemd-pam-239-31.el8_2.9.aarch64.rpm
SHA-256: a7ef1d1d32c9723ee2a7a69c87b8e0662a2a02ba20be674f5b634c5f27531ddc
systemd-pam-debuginfo-239-31.el8_2.9.aarch64.rpm
SHA-256: 44af80d6e925cc07b06be9938ce5b43ea585eeb5ad204142deefbac8a2d4fab6
systemd-tests-239-31.el8_2.9.aarch64.rpm
SHA-256: acf2442270518ec0d18b046b7bb378d62a085ed4dc3e79216acf7c340d2b09ed
systemd-tests-debuginfo-239-31.el8_2.9.aarch64.rpm
SHA-256: d7f2a32a9328bdbf2dd8a84f1d82c10762be3976e1902ff55f31e4fa67702ce0
systemd-udev-239-31.el8_2.9.aarch64.rpm
SHA-256: 92f5393477ebcd7a28ccfb3c189a770ad22261a07e1e47ab92ab21325592a21f
systemd-udev-debuginfo-239-31.el8_2.9.aarch64.rpm
SHA-256: 13fd8cd75af473602a429138a7db22bcfa42ee0571087ebcfe03ddc059051217
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2
SRPM
systemd-239-31.el8_2.9.src.rpm
SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1
ppc64le
systemd-239-31.el8_2.9.ppc64le.rpm
SHA-256: 8ff22e8f673367b1e08b2666357848c51f34ba4e90b84e6cafeb66c1fa7b76c8
systemd-container-239-31.el8_2.9.ppc64le.rpm
SHA-256: 1dc570ee245926cb4c8cf7f720d19591cb891eb36ea6ddb388c86e720bf64ef3
systemd-container-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: d63ad98e413f0224693528e425a143202d8af8d4c732ce17e9e96d8fda1bf6c9
systemd-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: 1ed58ad1bfcd0d08756b97254044a020dca1597d1d286fa16c2ecbb3c6fbb425
systemd-debugsource-239-31.el8_2.9.ppc64le.rpm
SHA-256: 38a5aed9862e33b41face9ce5876307a1c80614c58a3d606306c3c79f4c130fd
systemd-devel-239-31.el8_2.9.ppc64le.rpm
SHA-256: 6fe75b7f749d3eb5f686de1bf7b838f9b22f6d523a1a444bd20db0ea769bf745
systemd-journal-remote-239-31.el8_2.9.ppc64le.rpm
SHA-256: 8aabbc7fa599bc8360b2aefa743b8eb2421ee7019791694efb3db601c085453f
systemd-journal-remote-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: e1b29ac9d9b9dfbf6bdd2c4eed4e5e2a2441e4001ad03552568dee4016682d1c
systemd-libs-239-31.el8_2.9.ppc64le.rpm
SHA-256: 3b220a07434eaab8edeffe48fbf82b7673ecc04df2b315f0e7548f51a2d020e0
systemd-libs-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: afbbdc1ed5b59690458c9b162358f3bcde5751b8cef154861b545ebcc4c2c5b9
systemd-pam-239-31.el8_2.9.ppc64le.rpm
SHA-256: 7f67dfcdee22ef15221ccc524f27332a320f1b078be8926148f5b9e124c5fb1f
systemd-pam-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: 709eaf32a1aa5c5a57743e882b78e85836ff45cd6a4cff10b1ae6fad6b4cc741
systemd-tests-239-31.el8_2.9.ppc64le.rpm
SHA-256: c9478556b70a10d5aedae46151d80b6e4f3ec5a4f4f0393d5626676d4eddeeb7
systemd-tests-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: 5377d284d0ea66eead967ad66eab1f985f64cf6e5c34be2d31196cff4b3b0c02
systemd-udev-239-31.el8_2.9.ppc64le.rpm
SHA-256: c7ff62f40882f28a942a6b82531df6713e58111ce9b109210639be53a65c397a
systemd-udev-debuginfo-239-31.el8_2.9.ppc64le.rpm
SHA-256: 4f792c980a82bfaed78e6087733c81c94773331bab3702034c917db29a689bdc
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2
SRPM
systemd-239-31.el8_2.9.src.rpm
SHA-256: 4cf2a1da457f72a5305fc97814f2e383316aec14a24444a7a9807b6c2da325e1
x86_64
systemd-239-31.el8_2.9.i686.rpm
SHA-256: 980b9cee8a7a68c17584fff847d47ea59749f0315b47264c7ca28f3a51208ba6
systemd-239-31.el8_2.9.x86_64.rpm
SHA-256: 5017059b49b046a5af96fe622c26360e1fc0cdecd88ad38c12ee7b8d6230639f
systemd-container-239-31.el8_2.9.i686.rpm
SHA-256: 8fe010f6a57cf8fb00f9f271df2285f2657a0496f18342748b4612edbaf20edf
systemd-container-239-31.el8_2.9.x86_64.rpm
SHA-256: 3c9d75f16bba60fbcf758f814a866c6d88fef12e666980a844a7bb03bb5a4244
systemd-container-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 9e1eaf9b97ee067df7bd7ab8fbe98238b7c6a8eca3fe036fea381b39da3ee1ba
systemd-container-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: e3d98ceb86317ec6128dbce29a79f25896277fae2ed2f73026292a36d24a5a5a
systemd-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 28f3db18ab2b734f3f3614788a2fb273e0d76685a84996df100fe3908b2f8170
systemd-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 91b10ac27ba67ab69f93588e6648bd3c9708dca11c53fda7208069be25eb7023
systemd-debugsource-239-31.el8_2.9.i686.rpm
SHA-256: a8c06912ad7d1fa8966cc9bdd23072b0d66c35bdaad5952a4a405ac58c12ccde
systemd-debugsource-239-31.el8_2.9.x86_64.rpm
SHA-256: 51d188fe3012d40b2987844b0be6df0b152bb6e33f95551f9db0aa3d34ca2a46
systemd-devel-239-31.el8_2.9.i686.rpm
SHA-256: 944f9b7bea2dc32ff5535f25da9fbeaef0618de9ecc3a4cd45b2a8b3a2149330
systemd-devel-239-31.el8_2.9.x86_64.rpm
SHA-256: b9ac84a108574e467bab62b376837eaa7ab817ae3475e78e032ed2fb28392b00
systemd-journal-remote-239-31.el8_2.9.x86_64.rpm
SHA-256: fd67d87f6df794704d0a21a02b893feb738d44d0fd015e07ea0fb1eb21aee0ea
systemd-journal-remote-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 3cc6d3ace7d574ff19f8c52d4dc215be56025391093daf63227e2120c89c4e72
systemd-journal-remote-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 5fddeca31a41ea1fcf2fbadd57d2f8f0469f6f72ca6c46a9f289e8d1c9019fdf
systemd-libs-239-31.el8_2.9.i686.rpm
SHA-256: 340085884444b289d9768b1d3af927da56dd3f63f4a0a5d8cafb8a544675267b
systemd-libs-239-31.el8_2.9.x86_64.rpm
SHA-256: 7c5ef8f463e3476945a47ba4f2b0516d9378576d685c8a8c6f90482a9bb4d0fc
systemd-libs-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: c45788e8f29d2a995dd68022dc517d825e51bad38542587191ab9fe600214089
systemd-libs-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 80456bf449050eaa4f879d86dbc0c8896dad62558458eae5c980bba60391b7d4
systemd-pam-239-31.el8_2.9.x86_64.rpm
SHA-256: d01523d52f6c6c24e395d51f2c01c54aeadbaa6bd07205e94f48486622713a4f
systemd-pam-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: bb2960e08225c146d2c6d75462941a310e9e8113055983aa867f844043acf9dc
systemd-pam-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 1147797c47143f9bb7bda7ae9708c553adf2afd216c14d224149e752828246a9
systemd-tests-239-31.el8_2.9.x86_64.rpm
SHA-256: 5f0bcd48c40c63e9f38f08160ee884c149a6cf5072f71741a1f8096824e04224
systemd-tests-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: dc9e08d7b6c77794c746b068936e6f728db753340be73bd67bf7eb95a3556988
systemd-tests-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 4937869bf8fd91b8f33ab382b0e105026b60e9b3af47ba24a25ddb1843eab0be
systemd-udev-239-31.el8_2.9.x86_64.rpm
SHA-256: 10a035322e4e800e88f05c3d66ff78b50c76a031a83392bb9e4bc3da32022c94
systemd-udev-debuginfo-239-31.el8_2.9.i686.rpm
SHA-256: 443f0820fe7c4cfd2c648d2909283ffc5d8353aae946f967d2b8eb1ed0b85c0d
systemd-udev-debuginfo-239-31.el8_2.9.x86_64.rpm
SHA-256: 3aaa671dce4ff696a4295a8fc3c75f73d28fd43623778e9a7c7353fc38c5a615
Related news
Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
Red Hat Security Advisory 2022-6890-01 - Red Hat OpenShift Virtualization release 4.8.7 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.
Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-31150: nodejs16: CRLF injection in node-undici * CVE-2022-31151: nodejs/undici: Cookie headers uncleared on cross-origin redirect * CV...
An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs * CVE-2022-...
Red Hat Security Advisory 2022-6308-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.8.49. There are no RPMs for this release. Space precludes documenting all of the container images in this advisory. Issues addressed include bypass and code execution vulnerabilities.
Ubuntu Security Notice 5583-2 - USN-5583-1 fixed vulnerabilities in systemd. Unfortunately this caused a regression by introducing networking problems for some users. This update fixes the problem. It was discovered that systemd incorrectly handled certain DNS requests, which leads to user-after-free vulnerability. An attacker could possibly use this issue to cause a crash or execute arbitrary code.
Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6317-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.48. Issues addressed include a bypass vulnerability.
Red Hat OpenShift Container Platform release 4.7.59 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass
Red Hat OpenShift Container Platform release 4.9.48 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass
Red Hat Security Advisory 2022-6263-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.61. Issues addressed include denial of service and out of bounds read vulnerabilities.
Red Hat OpenShift Container Platform release 4.6.61 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Red Hat Security Advisory 2022-6258-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.31. Issues addressed include a code execution vulnerability.
Red Hat OpenShift Container Platform release 4.11.3 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Red Hat Security Advisory 2022-6252-02 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 3.11.784. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6348-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.
Multicluster Engine v2.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: golang: compress/gzi...
Submariner 0.13 packages that fix security issues and bugs, as well as adds various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions...
Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6206-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.
Ubuntu Security Notice 5583-1 - It was discovered that systemd incorrectly handled certain DNS requests, which leads to user-after-free vulnerability. An attacker could possibly use this issue to cause a crash or execute arbitrary code.
An update for systemd is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
Red Hat Security Advisory 2022-6163-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2022-6160-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2022-6161-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.
An update for systemd is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
An update for systemd is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
An update for systemd is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2526: systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c