In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1039662 | third party advisory vdb entry |
http://www.securityfocus.com/bid/101600 | third party advisory vdb entry |
https://github.com/systemd/systemd/pull/7184 | patch third party advisory issue tracking |
https://usn.ubuntu.com/3558-1/ | patch vendor advisory third party advisory |
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351 | patch third party advisory issue tracking |