systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
[
    {
        "target": {
            "file": "src/resolve/resolved-dns-packet.c"
        },
        "id": "CVE-2017-9217-73b0e95b",
        "signature_type": "Line",
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "271159967483008844882920999565096995717",
                "45454489445256345147963977968913982856",
                "230245785695975270983349848465728071677"
            ]
        }
    },
    {
        "target": {
            "function": "dns_packet_is_reply_for",
            "file": "src/resolve/resolved-dns-packet.c"
        },
        "id": "CVE-2017-9217-7ccf451d",
        "signature_type": "Function",
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
        "digest": {
            "function_hash": "146998496955851844362737428613817786473",
            "length": 322.0
        }
    }
]