CVE-2023-50387

Updated: 2026-02-27 00:29:01.066237

Description:

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

CentOS 7 ELS dhcp 4.2.5 7.5 HIGH Already Fixed 2025-11-18 16:09:10
CentOS 8.4 ELS bind 9.11.26 7.5 HIGH Released CLSA-2024:1709550262 2024-03-04 08:42:22
CentOS 8.4 ELS dhcp 4.3.6-44 7.5 HIGH Not Vulnerable 2024-10-11 10:45:33
CentOS 8.5 ELS dhcp 4.3.6-45 7.5 HIGH Not Vulnerable 2024-10-11 10:45:33
CentOS 8.5 ELS bind 9.11.26 7.5 HIGH Released CLSA-2024:1709561259 2024-03-04 10:08:53
CentOS Stream 8 ELS bind 9.11.36 7.5 HIGH Released CLSA-2024:1730480495 2024-11-01 14:31:00
CentOS Stream 8 ELS dhcp 4.3.6 7.5 HIGH Not Vulnerable 2024-10-11 10:45:33
CloudLinux 6 ELS dhcp 4.1.1 7.5 HIGH Not Vulnerable 2024-10-11 10:45:32
CloudLinux 6 ELS bind 9.8.2 7.5 HIGH Released CLSA-2024:1710439896 2024-03-25 09:51:20
CloudLinux 7 ELS dhcp 4.2.5 7.5 HIGH Already Fixed 2025-12-23 01:56:26
Total: 35