systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://github.com/systemd/systemd/pull/5998 | issue tracking third party advisory patch |
https://launchpad.net/bugs/1621396 | issue tracking third party advisory |
https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/98677 | vdb entry third party advisory |
https://security.netapp.com/advisory/ntap-20241213-0003/ |