Total vulnerabilities in the database
In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
Software | From | Fixed in |
---|---|---|
systemd_project / systemd | 228 | 228.x |
systemd_project / systemd | 229 | 229.x |
systemd_project / systemd | 224 | 224.x |
systemd_project / systemd | 225 | 225.x |
systemd_project / systemd | 223 | 223.x |
systemd_project / systemd | 232 | 232.x |
systemd_project / systemd | 234 | 234.x |
systemd_project / systemd | 230 | 230.x |
systemd_project / systemd | 231 | 231.x |
systemd_project / systemd | 226 | 226.x |
systemd_project / systemd | 227 | 227.x |
systemd_project / systemd | 235 | 235.x |
systemd_project / systemd | 233 | 233.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |