USN-5583-2: systemd regression
Publication date
14 September 2022
Overview
USN-5583-1 caused a regression in systemd
Releases
Packages
- systemd - system and service manager
Details
USN-5583-1 fixed vulnerabilities in systemd. Unfortunately this caused a
regression by introducing networking problems for some users. This update fixes
the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that systemd incorrectly handled certain DNS requests,
which leads to user-after-free vulnerability. An attacker could possibly use
this issue to cause a crash or execute arbitrary code. (CVE-2022-2526)
USN-5583-1 fixed vulnerabilities in systemd. Unfortunately this caused a
regression by introducing networking problems for some users. This update fixes
the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that systemd incorrectly handled certain DNS requests,
which leads to user-after-free vulnerability. An attacker could possibly use
this issue to cause a crash or execute arbitrary code. (CVE-2022-2526)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
18.04 bionic | systemd – 237-3ubuntu10.56 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.