Generated remediation guidance and an executive summary. No account required.
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
Cite this page
CVE-2022-2526. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2022-2526
Use CWE-416, Systemd Project vendor hub and Systemd product page to widen CVE-2022-2526 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-40224, CVE-2026-40226 and CVE-2026-40225 for nearby disclosures in the same product family.