CVE-2018-21029

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)
Configurations

Configuration 1 (hide)

cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

History

07 Nov 2023, 02:56

Type Values Removed Values Added
Summary ** DISPUTED ** systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent). systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NLJVOJMB6ANDILRLDZK26YGLYBEPHKY/', 'name': 'FEDORA-2019-4c3ce3aa5c', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NLJVOJMB6ANDILRLDZK26YGLYBEPHKY/ -

18 Apr 2022, 18:12

Type Values Removed Values Added
First Time Fedoraproject fedora
Fedoraproject
References (MISC) https://github.com/systemd/systemd/pull/13870 - (MISC) https://github.com/systemd/systemd/pull/13870 - Patch, Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20191122-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20191122-0002/ - Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NLJVOJMB6ANDILRLDZK26YGLYBEPHKY/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NLJVOJMB6ANDILRLDZK26YGLYBEPHKY/ - Mailing List, Third Party Advisory
References (MISC) https://tools.ietf.org/html/rfc7858#section-4.1 - (MISC) https://tools.ietf.org/html/rfc7858#section-4.1 - Third Party Advisory
References (MISC) https://github.com/systemd/systemd/blob/v239/man/resolved.conf.xml#L199-L207 - (MISC) https://github.com/systemd/systemd/blob/v239/man/resolved.conf.xml#L199-L207 - Exploit, Third Party Advisory
References (MISC) https://github.com/systemd/systemd/blob/v243/man/resolved.conf.xml#L196-L207 - (MISC) https://github.com/systemd/systemd/blob/v243/man/resolved.conf.xml#L196-L207 - Exploit, Third Party Advisory
CPE cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

28 Jan 2022, 19:12

Type Values Removed Values Added
CPE cpe:2.3:a:freedesktop:systemd:*:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*
First Time Systemd Project
Systemd Project systemd

Information

Published : 2019-10-30 22:15

Updated : 2024-04-11 01:01


NVD link : CVE-2018-21029

Mitre link : CVE-2018-21029

CVE.ORG link : CVE-2018-21029


JSON object : View

Products Affected

fedoraproject

  • fedora

systemd_project

  • systemd
CWE
CWE-295

Improper Certificate Validation