{"id":"USN-5583-2","summary":"systemd regression","details":"USN-5583-1 fixed vulnerabilities in systemd. Unfortunately this caused a \nregression by introducing networking problems for some users. This update fixes\nthe problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\n It was discovered that systemd incorrectly handled certain DNS requests, \n which leads to user-after-free vulnerability. An attacker could possibly use \n this issue to cause a crash or execute arbitrary code. (CVE-2022-2526)\n","modified":"2026-02-10T04:42:45Z","published":"2022-09-14T03:01:57Z","related":["UBUNTU-CVE-2022-2526"],"upstream":["CVE-2022-2526","UBUNTU-CVE-2022-2526"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5583-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2526"},{"type":"REPORT","url":"https://launchpad.net/bugs/1988119"}],"affected":[{"package":{"name":"systemd","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/systemd@237-3ubuntu10.56?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"237-3ubuntu10.56"}]}],"versions":["234-2ubuntu12","235-2ubuntu3","235-3ubuntu2","235-3ubuntu3","237-3ubuntu3","237-3ubuntu4","237-3ubuntu6","237-3ubuntu7","237-3ubuntu8","237-3ubuntu10","237-3ubuntu10.2","237-3ubuntu10.3","237-3ubuntu10.4","237-3ubuntu10.6","237-3ubuntu10.9","237-3ubuntu10.11","237-3ubuntu10.12","237-3ubuntu10.13","237-3ubuntu10.15","237-3ubuntu10.17","237-3ubuntu10.19","237-3ubuntu10.20","237-3ubuntu10.21","237-3ubuntu10.22","237-3ubuntu10.23","237-3ubuntu10.24","237-3ubuntu10.25","237-3ubuntu10.26","237-3ubuntu10.28","237-3ubuntu10.29","237-3ubuntu10.31","237-3ubuntu10.33","237-3ubuntu10.38","237-3ubuntu10.39","237-3ubuntu10.40","237-3ubuntu10.41","237-3ubuntu10.42","237-3ubuntu10.43","237-3ubuntu10.44","237-3ubuntu10.45","237-3ubuntu10.46","237-3ubuntu10.47","237-3ubuntu10.48","237-3ubuntu10.49","237-3ubuntu10.50","237-3ubuntu10.51","237-3ubuntu10.52","237-3ubuntu10.53","237-3ubuntu10.54"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"237-3ubuntu10.56","binary_name":"libnss-myhostname"},{"binary_version":"237-3ubuntu10.56","binary_name":"libnss-mymachines"},{"binary_version":"237-3ubuntu10.56","binary_name":"libnss-resolve"},{"binary_version":"237-3ubuntu10.56","binary_name":"libnss-systemd"},{"binary_version":"237-3ubuntu10.56","binary_name":"libpam-systemd"},{"binary_version":"237-3ubuntu10.56","binary_name":"libsystemd-dev"},{"binary_version":"237-3ubuntu10.56","binary_name":"libsystemd0"},{"binary_version":"237-3ubuntu10.56","binary_name":"libudev-dev"},{"binary_version":"237-3ubuntu10.56","binary_name":"libudev1"},{"binary_version":"237-3ubuntu10.56","binary_name":"systemd"},{"binary_version":"237-3ubuntu10.56","binary_name":"systemd-container"},{"binary_version":"237-3ubuntu10.56","binary_name":"systemd-coredump"},{"binary_version":"237-3ubuntu10.56","binary_name":"systemd-journal-remote"},{"binary_version":"237-3ubuntu10.56","binary_name":"systemd-sysv"},{"binary_version":"237-3ubuntu10.56","binary_name":"systemd-tests"},{"binary_version":"237-3ubuntu10.56","binary_name":"udev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5583-2.json","cves_map":{"cves":[{"id":"CVE-2022-2526","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.3"}