vulnerability

SUSE: CVE-2018-21029: SUSE Linux Security Advisory

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Oct 30, 2019
Added
Feb 4, 2022
Modified
Feb 4, 2022

Description

** DISPUTED ** systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent).

Solutions

suse-upgrade-libsystemd0suse-upgrade-libsystemd0-32bitsuse-upgrade-libudev-develsuse-upgrade-libudev1suse-upgrade-libudev1-32bitsuse-upgrade-systemdsuse-upgrade-systemd-32bitsuse-upgrade-systemd-containersuse-upgrade-systemd-coredumpsuse-upgrade-systemd-develsuse-upgrade-systemd-docsuse-upgrade-systemd-journal-remotesuse-upgrade-systemd-langsuse-upgrade-systemd-sysvinitsuse-upgrade-udev
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.