Security experts are warning of a bug that could allow hackers to craft TCP packets that fool Linux's initialization deamon systemd, which could cause systems to crash or make them run malicious code.
Ubuntu maker Canonical has released a patch to address the issue discovered by Chris Coulson, a software engineer at the firm.
"A malicious DNS server can exploit this by responding with a specially crafted TCP payload to trick systemd-resolved in to allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it," Coulson wrote.
The bug, identified as CVE-2017-9445, could be used by a remote attacker to cause a denial of service in the daemon or execute arbitrary code, Canonical notes in its advisory.
Debian developers note that the issue doesn't affected Debian Wheezy and Jessie, while Stretch and Buster are vulnerable. However, in Stretch's case, the issue is considered "minor" because systems-resolved is not enabled by default.
A researcher in January discovered systemd version 232 contained a flaw that could give a local attacker root access to affected devices.