A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.
https://access.redhat.com/errata/RHSA-2024:3203
https://access.redhat.com/errata/RHSA-2024:2463
https://security.netapp.com/advisory/ntap-20241122-0004/
https://lists.fedoraproject.org/archives/list/[email protected]/message/QHNBXGKJWISJETTTDTZKTBFIBJUOSLKL/
https://lists.fedoraproject.org/archives/list/[email protected]/message/4GMDEG5PKONWNHOEYSUDRT6JEOISRMN2/
https://github.com/systemd/systemd/issues/25676
https://bugzilla.redhat.com/show_bug.cgi?id=2222672
https://bugzilla.redhat.com/show_bug.cgi?id=2222261
https://access.redhat.com/security/cve/CVE-2023-7008
Source: Mitre, NVD
Published: 2023-12-23
Updated: 2024-11-22
Base Score: 5.4
Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:C/A:N
Severity: Medium
Base Score: 5.9
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS: 0.00671