Unrated severityNVD Advisory· Published Oct 30, 2019· Updated Aug 5, 2024
CVE-2018-21029
CVE-2018-21029
Description
systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)
Affected products
2- systemd/systemddescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NLJVOJMB6ANDILRLDZK26YGLYBEPHKY/mitrevendor-advisoryx_refsource_FEDORA
- blog.cloudflare.com/dns-encryption-explained/mitrex_refsource_MISC
- github.com/systemd/systemd/blob/v239/man/resolved.conf.xmlmitrex_refsource_MISC
- github.com/systemd/systemd/blob/v243/man/resolved.conf.xmlmitrex_refsource_MISC
- github.com/systemd/systemd/blob/v243/src/resolve/resolved-dnstls-gnutls.cmitrex_refsource_MISC
- github.com/systemd/systemd/issues/9397mitrex_refsource_MISC
- github.com/systemd/systemd/pull/13870mitrex_refsource_MISC
- security.netapp.com/advisory/ntap-20191122-0002/mitrex_refsource_CONFIRM
- tools.ietf.org/html/rfc7858mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.