Red Hat Bugzilla – Bug 1507515
CVE-2017-15908 systemd: Infinite loop in the dns_packet_read_type_window() function
Last modified: 2018-02-12 03:57:42 EST
In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service. References: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351 Upstream pull request: https://github.com/systemd/systemd/pull/7184 Upstream patch: https://github.com/systemd/systemd/commit/8aeadf3052a2130b88d5bccf5439890e1034f28d
Statement: This issue did not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7 as they did not include the vulnerable code.