systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
[
{
"signature_type": "Line",
"source": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"271159967483008844882920999565096995717",
"45454489445256345147963977968913982856",
"230245785695975270983349848465728071677"
]
},
"id": "CVE-2017-9217-73b0e95b",
"target": {
"file": "src/resolve/resolved-dns-packet.c"
}
},
{
"signature_type": "Function",
"source": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "146998496955851844362737428613817786473",
"length": 322.0
},
"id": "CVE-2017-9217-7ccf451d",
"target": {
"function": "dns_packet_is_reply_for",
"file": "src/resolve/resolved-dns-packet.c"
}
}
]