{"id":"USN-5583-1","summary":"systemd vulnerability","details":"It was discovered that systemd incorrectly handled certain DNS requests, \nwhich leads to user-after-free vulnerability. An attacker could possibly use \nthis issue to cause a crash or execute arbitrary code. (CVE-2022-2526)\n","modified":"2026-04-22T10:47:06.644821Z","published":"2022-08-29T08:54:00Z","related":["UBUNTU-CVE-2022-2526"],"upstream":["CVE-2022-2526","UBUNTU-CVE-2022-2526"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5583-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2526"}],"affected":[{"package":{"name":"systemd","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/systemd@237-3ubuntu10.54?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"237-3ubuntu10.54"}]}],"versions":["234-2ubuntu12","235-2ubuntu3","235-3ubuntu2","235-3ubuntu3","237-3ubuntu3","237-3ubuntu4","237-3ubuntu6","237-3ubuntu7","237-3ubuntu8","237-3ubuntu10","237-3ubuntu10.2","237-3ubuntu10.3","237-3ubuntu10.4","237-3ubuntu10.6","237-3ubuntu10.9","237-3ubuntu10.11","237-3ubuntu10.12","237-3ubuntu10.13","237-3ubuntu10.15","237-3ubuntu10.17","237-3ubuntu10.19","237-3ubuntu10.20","237-3ubuntu10.21","237-3ubuntu10.22","237-3ubuntu10.23","237-3ubuntu10.24","237-3ubuntu10.25","237-3ubuntu10.26","237-3ubuntu10.28","237-3ubuntu10.29","237-3ubuntu10.31","237-3ubuntu10.33","237-3ubuntu10.38","237-3ubuntu10.39","237-3ubuntu10.40","237-3ubuntu10.41","237-3ubuntu10.42","237-3ubuntu10.43","237-3ubuntu10.44","237-3ubuntu10.45","237-3ubuntu10.46","237-3ubuntu10.47","237-3ubuntu10.48","237-3ubuntu10.49","237-3ubuntu10.50","237-3ubuntu10.51","237-3ubuntu10.52","237-3ubuntu10.53"],"ecosystem_specific":{"binaries":[{"binary_version":"237-3ubuntu10.54","binary_name":"libnss-myhostname"},{"binary_version":"237-3ubuntu10.54","binary_name":"libnss-mymachines"},{"binary_version":"237-3ubuntu10.54","binary_name":"libnss-resolve"},{"binary_version":"237-3ubuntu10.54","binary_name":"libnss-systemd"},{"binary_version":"237-3ubuntu10.54","binary_name":"libpam-systemd"},{"binary_version":"237-3ubuntu10.54","binary_name":"libsystemd0"},{"binary_version":"237-3ubuntu10.54","binary_name":"libudev1"},{"binary_version":"237-3ubuntu10.54","binary_name":"systemd"},{"binary_version":"237-3ubuntu10.54","binary_name":"systemd-container"},{"binary_version":"237-3ubuntu10.54","binary_name":"systemd-coredump"},{"binary_version":"237-3ubuntu10.54","binary_name":"systemd-journal-remote"},{"binary_version":"237-3ubuntu10.54","binary_name":"systemd-sysv"},{"binary_version":"237-3ubuntu10.54","binary_name":"systemd-tests"},{"binary_version":"237-3ubuntu10.54","binary_name":"udev"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5583-1.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2526"}]}}}],"schema_version":"1.7.5"}