A new vulnerability has discovered on the systemd package called Evil DNS allowing the remote control of a linux machine. From the security-tracker.debian , the debian Stretch , Buster and Sid are vulnerable. ( Also affect a various Linux distro with Systemd)
System check:
On Debian Stretch , my systemd --version is systemd 232 before and after the system update.
The systemctl status systemd-resolved.service command say that the systemd-resolved is disabled.
How to easily understand and mitigate the Evil DNS remote attack under linux systems? Does stopping the systemd-resolved service is sufficient to prevent the Evil DNS attack?