CVE-2023-50387

Updated: 2026-02-27 00:29:01.066237

Description:

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

CloudLinux 7 ELS bind 9.11.4 7.5 HIGH Already Fixed 2024-10-02 14:26:03
CloudLinux 7 ELS unbound 1.6.6 7.5 HIGH Released CLSA-2025:1765309238 2026-01-22 05:30:16
Debian 10 ELS bind9 9.11.5 7.5 HIGH Already Fixed 2025-10-21 18:58:40
Oracle Linux 6 ELS dhcp 4.1.1 7.5 HIGH Not Vulnerable 2024-10-11 10:45:33
Oracle Linux 6 ELS bind 9.8.2 7.5 HIGH Released CLSA-2024:1710437080 2024-03-14 14:09:21
Oracle Linux 7 ELS unbound 1.6.6 7.5 HIGH Released CLSA-2025:1765282338 2025-12-09 20:55:37
Oracle Linux 7 ELS bind 9.11.4 7.5 HIGH Already Fixed 2025-02-14 23:51:12
Oracle Linux 7 ELS dhcp 4.2.5 7.5 HIGH Already Fixed 2026-01-12 19:23:23
RHEL 7 ELS unbound 1.6.6 7.5 HIGH Released CLSA-2025:1756230743 2025-08-28 09:20:07
RHEL 7 ELS dhcp 4.2.5 7.5 HIGH Already Fixed 2025-08-20 07:18:09
Total: 35