A flaw in systemd, the init system used on many Linux systems, can be exploited using a malicious DNS query to either crash a system or to run code remotely.
The vulnerability resides in the daemon systemd-resolved and can be triggered using a TCP payload, according to Ubuntu developer Chris Coulson.
This component can be tricked into allocating less memory than needed for a look-up. When the reply is bigger it overflows the buffer allowing an attacker to overwrite memory.
This would result in the process either crashing or it could allow for code execution remotely.
Ubuntu has released patches for its two most recent releases — 16.10 and 17.04 — to fix the issue.
Debian is yet to issue a fix, but has pointed out that systemd-resolved is not enabled by default in its latest release, Stretch. Older Debian releases like Jessie and Wheezy do not contain the vulnerable code.
Red Hat said the flaw did not affect versions of systemd shipped with Red Hat Enterprise Linux 7.
A QA engineer walks into a bar and orders 1 beer, then orders 2 beers, then orders "a" beer, then orders 53736394 beers, then orders a cat, and finally "djdhsisnslsj"
I've been using Funtoo which is just a flavor of Gentoo and it's default init system is OpenRC and I hate it. why? cause I've been using Systemd for so long that I don't want to use any other init system..
When I got my start in Linux, Lennart had gotten death threats and RedHat said : ... 'Hey, It's here to stay so chill' so I really didn't have a say in the matter !