{"id":"AZL-32271","summary":"CVE-2023-7008 affecting package systemd-bootstrap for versions less than 250.3-13","details":"A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.","modified":"2026-04-01T05:11:01.163485Z","published":"2023-12-23T13:15:07Z","upstream":["CVE-2023-7008"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-7008"}],"affected":[{"package":{"name":"systemd-bootstrap","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/systemd-bootstrap"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"250.3-13"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-32271.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}