systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
{ "vanir_signatures": [ { "signature_version": "v1", "target": { "file": "src/resolve/resolved-dns-packet.c" }, "deprecated": false, "source": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be", "digest": { "line_hashes": [ "271159967483008844882920999565096995717", "45454489445256345147963977968913982856", "230245785695975270983349848465728071677" ], "threshold": 0.9 }, "signature_type": "Line", "id": "CVE-2017-9217-73b0e95b" }, { "signature_version": "v1", "target": { "file": "src/resolve/resolved-dns-packet.c", "function": "dns_packet_is_reply_for" }, "deprecated": false, "source": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be", "digest": { "length": 322.0, "function_hash": "146998496955851844362737428613817786473" }, "signature_type": "Function", "id": "CVE-2017-9217-7ccf451d" } ] }