Bug#880026: systemd: CVE-2017-15908

Salvatore Bonaccorso carnil at debian.org
Sat Oct 28 16:38:05 BST 2017

Source: systemd
Version: 232-1
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/systemd/systemd/pull/7184


the following vulnerability was published for systemd.

| In systemd 223 through 235, a remote DNS server can respond with a
| custom crafted DNS NSEC resource record to trigger an infinite loop in
| the dns_packet_read_type_window() function of the 'systemd-resolved'
| service and cause a DoS of the affected service.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-15908
[1] https://github.com/systemd/systemd/pull/7184
[2] https://github.com/systemd/systemd/commit/9f939335a07085aa9a9663efd1dca06ef6405d62

Please adjust the affected versions in the BTS as needed.

Since systemd-resolved is not enabled by default I think an update via
an upcoming stretch point release would be enough. Please let us know
if you disagre.


More information about the Pkg-systemd-maintainers mailing list