[Git][security-tracker-team/security-tracker][master] Add systemd to CVE-2023-5038{7,8} entries

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Feb 26 21:32:07 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
3090531d by Salvatore Bonaccorso at 2024-02-26T22:28:34+01:00
Add systemd to CVE-2023-5038{7,8} entries

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2931,6 +2931,9 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4
 	- knot-resolver 5.7.1-1
 	- pdns-recursor 4.9.3-1 (bug #1063852)
 	- unbound 1.19.1-1 (bug #1063845)
+	- systemd <unfixed>
+	[bookworm] - systemd <no-dsa> (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release)
+	[bullseye] - systemd <no-dsa> (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release)
 	NOTE: https://kb.isc.org/docs/cve-2023-50387
 	NOTE: https://gitlab.isc.org/isc-projects/bind9/-/commit/c12608ca934c0433d280e65fe6c631013e200cfe (v9.16.48)
 	NOTE: https://gitlab.isc.org/isc-projects/bind9/-/commit/751b7cc4750ede6d8c5232751d60aad8ad84aa67 (v9.16.48)
@@ -2946,6 +2949,8 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4
 	NOTE: https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
 	NOTE: https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
 	NOTE: Fixed by: https://github.com/NLnetLabs/unbound/commit/882903f2fa800c4cb6f5e225b728e2887bb7b9ae (release-1.19.1)
+	NOTE: https://github.com/systemd/systemd/issues/31413
+	NOTE: systemd: DNSSEC is default to off in systemd-resolved
 CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 whe ...)
 	{DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3736-1}
 	- bind9 1:9.19.21-1
@@ -2953,6 +2958,9 @@ CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC 51
 	- knot-resolver 5.7.1-1
 	- pdns-recursor 4.9.3-1 (bug #1063852)
 	- unbound 1.19.1-1 (bug #1063845)
+	- systemd <unfixed>
+	[bookworm] - systemd <no-dsa> (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release)
+	[bullseye] - systemd <no-dsa> (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release)
 	NOTE: https://kb.isc.org/docs/cve-2023-50868
 	NOTE: https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
 	NOTE: https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
@@ -2969,6 +2977,8 @@ CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC 51
 	NOTE: https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
 	NOTE: https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
 	NOTE: Fixed by: https://github.com/NLnetLabs/unbound/commit/92f2a1ca690a44880f4c4fa70a4b5a4b029aaf1c (release-1.19.1)
+	NOTE: https://github.com/systemd/systemd/issues/31413
+	NOTE: systemd: DNSSEC is default to off in systemd-resolved
 CVE-2024-25914 (Cross-Site Request Forgery (CSRF) vulnerability in Photoboxone SMTP Ma ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-25643 (The SAP Fiori app (My Overtime Request) - version 605, does not perfor ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3090531d59bbacf831e7049accb78713afec1c29

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3090531d59bbacf831e7049accb78713afec1c29
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240226/f4036a66/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list