### [CVE-2018-21029](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21029) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description ** DISPUTED ** systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent). ### POC #### Reference - https://github.com/systemd/systemd/issues/9397 - https://github.com/systemd/systemd/issues/9397 #### Github No PoCs found on GitHub currently.