Ubuntu 5583-2: systemd regression | LinuxSecurity.com

Advisories

==========================================================================
Ubuntu Security Notice USN-5583-2
September 14, 2022

systemd regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

USN-5583-1 caused a regression in systemd

Software Description:
- systemd: system and service manager

Details:

USN-5583-1 fixed vulnerabilities in systemd. Unfortunately this caused a 
regression by introducing netowrking problems for some users. This update fixes
the problem.

We apologize for the inconvenience.

Original advisory details:

 It was discovered that systemd incorrectly handled certain DNS requests, 
 which leads to user-after-free vulnerability. An attacker could possibly use 
 this issue to cause a crash or execute arbitrary code. (CVE-2022-2526)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  systemd                         237-3ubuntu10.56

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5583-2
  https://ubuntu.com/security/notices/USN-5583-1
  https://launchpad.net/bugs/1988119

Package Information:
  https://launchpad.net/ubuntu/+source/systemd/237-3ubuntu10.56

Ubuntu 5583-2: systemd regression

September 14, 2022

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS Summary: USN-5583-1 caused a regression in systemd Software Description: - systemd: system and service manager Details: USN-5583-1 fixed vulnerabilities in systemd. Unfortunately this caused a regression by introducing netowrking problems for some users. This update fixes the problem. We apologize for the inconvenience. Original advisory details: It was discovered that systemd incorrectly handled certain DNS requests, which leads to user-after-free vulnerability. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2022-2526)

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: systemd 237-3ubuntu10.56 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5583-2

https://ubuntu.com/security/notices/USN-5583-1

https://launchpad.net/bugs/1988119

Severity
Ubuntu Security Notice USN-5583-2

Package Information

https://launchpad.net/ubuntu/+source/systemd/237-3ubuntu10.56

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.