In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade RHEL:7
systemd-python
to version 0:219-78.el7_9.7 or higher.
This issue was patched in RHSA-2022:6160
.
Note: Versions mentioned in the description apply only to the upstream systemd-python
package and not the systemd-python
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.