Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.884240
Categoría:CentOS Local Security Checks
Título:CentOS: Security Advisory for libgudev1-219-78.el7_ (CESA-2022:6160)
Resumen:The remote host is missing an update for the 'libgudev1-219-78.el7_'; package(s) announced via the CESA-2022:6160 advisory.
Descripción:Summary:
The remote host is missing an update for the 'libgudev1-219-78.el7_'
package(s) announced via the CESA-2022:6160 advisory.

Vulnerability Insight:
The systemd packages contain systemd, a system and service manager for
Linux, compatible with the SysV and LSB init scripts. It provides
aggressive parallelism capabilities, uses socket and D-Bus activation for
starting services, offers on-demand starting of daemons, and keeps track of
processes using Linux cgroups. In addition, it supports snapshotting and
restoring of the system state, maintains mount and automount points, and
implements an elaborate transactional dependency-based service control
logic. It can also work as a drop-in replacement for sysvinit.

Security Fix(es):

* systemd-resolved: use-after-free when dealing with DnsStream in
resolved-dns-stream.c (CVE-2022-2526)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Affected Software/OS:
'libgudev1-219-78.el7_' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2022-2526
https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f27c
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.