Bug#880026: systemd: CVE-2017-15908

Salvatore Bonaccorso carnil at debian.org
Sat Oct 28 16:38:05 BST 2017


Source: systemd
Version: 232-1
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/systemd/systemd/pull/7184

Hi,

the following vulnerability was published for systemd.

CVE-2017-15908[0]:
| In systemd 223 through 235, a remote DNS server can respond with a
| custom crafted DNS NSEC resource record to trigger an infinite loop in
| the dns_packet_read_type_window() function of the 'systemd-resolved'
| service and cause a DoS of the affected service.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-15908
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15908
[1] https://github.com/systemd/systemd/pull/7184
[2] https://github.com/systemd/systemd/commit/9f939335a07085aa9a9663efd1dca06ef6405d62

Please adjust the affected versions in the BTS as needed.

Since systemd-resolved is not enabled by default I think an update via
an upcoming stretch point release would be enough. Please let us know
if you disagre.

Regards,
Salvatore



More information about the Pkg-systemd-maintainers mailing list