CVE-2018-21029

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)
Configurations

Configuration 1 (hide)

cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-10-30 22:15

Updated : 2024-05-17 01:27


NVD link : CVE-2018-21029

Mitre link : CVE-2018-21029

CVE.ORG link : CVE-2018-21029


JSON object : View

Products Affected

systemd_project

  • systemd

fedoraproject

  • fedora
CWE
CWE-295

Improper Certificate Validation