CVE-2023-50387
Publication date 13 February 2024
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
Status
Package | Ubuntu Release | Status |
---|---|---|
bind9 | 24.10 oracular |
Fixed 1:9.18.24-0ubuntu1
|
24.04 LTS noble |
Fixed 1:9.18.24-0ubuntu1
|
|
22.04 LTS jammy |
Fixed 1:9.18.18-0ubuntu0.22.04.2
|
|
20.04 LTS focal |
Fixed 1:9.16.48-0ubuntu0.20.04.1
|
|
18.04 LTS bionic |
Fixed 1:9.11.3+dfsg-1ubuntu1.19+esm3
|
|
16.04 LTS xenial |
Fixed 1:9.10.3.dfsg.P4-8ubuntu1.19+esm8
|
|
14.04 LTS trusty |
Fixed 1:9.9.5.dfsg-3ubuntu0.19+esm12
|
|
bind9-libs | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
dnsmasq | 24.10 oracular |
Fixed 2.90-1
|
24.04 LTS noble |
Fixed 2.90-1
|
|
22.04 LTS jammy |
Fixed 2.90-0ubuntu0.22.04.1
|
|
20.04 LTS focal |
Fixed 2.90-0ubuntu0.20.04.1
|
|
18.04 LTS bionic |
Fixed 2.90-0ubuntu0.18.04.1+esm1
|
|
16.04 LTS xenial |
Fixed 2.90-0ubuntu0.16.04.1+esm1
|
|
14.04 LTS trusty | Ignored end of ESM support, was needs-triage | |
isc-dhcp | 24.10 oracular |
Needs evaluation
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
knot-resolver | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Vulnerable, work in progress
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty | Not in release | |
pdns-recursor | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Vulnerable, work in progress
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty | Ignored end of standard support | |
unbound | 24.10 oracular |
Fixed 1.19.1-1ubuntu1
|
24.04 LTS noble |
Fixed 1.19.1-1ubuntu1
|
|
22.04 LTS jammy |
Fixed 1.13.1-1ubuntu5.4
|
|
20.04 LTS focal |
Fixed 1.9.4-2ubuntu1.5
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty | Ignored end of ESM support, was needs-triage |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
alexmurray
As of isc-dhcp-4.4.3-1, isc-dhcp vendors bind9 libs
mdeslaur
This is unlikely to affect isc-dhcp's use of bind9-libs and the vendored bind9 libs, marking as negligible
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6633-1
- Bind vulnerabilities
- 13 February 2024
- USN-6642-1
- Bind vulnerabilities
- 19 February 2024
- USN-6657-1
- Dnsmasq vulnerabilities
- 26 February 2024
- USN-6665-1
- Unbound vulnerabilities
- 28 February 2024
- USN-6723-1
- Bind vulnerabilities
- 9 April 2024
- USN-6657-2
- Dnsmasq vulnerabilities
- 24 April 2024
Other references
- https://kb.isc.org/docs/cve-2023-50387
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
- https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
- https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
- https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
- https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
- https://www.cve.org/CVERecord?id=CVE-2023-50387