Updated: 2026-02-27 00:29:01.066237
Description:
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| RHEL 7 ELS | bind | 9.11.4 | 7.5 | HIGH | Released | CLSA-2025:1755512368 | 2025-08-19 06:33:22 | |
| Ubuntu 16.04 ELS | bind9 | 9.10.3 | 7.5 | HIGH | Released | CLSA-2024:1709562163 | 2024-03-04 10:08:54 | |
| Ubuntu 16.04 ELS | dhcp | 4.3.3 | 7.5 | HIGH | Not Vulnerable | 2024-10-09 14:26:49 | ||
| Ubuntu 18.04 ELS | bind9 | 9.11.3 | 7.5 | HIGH | Released | CLSA-2024:1709562964 | 2024-03-04 10:08:55 | |
| Ubuntu 18.04 ELS | dhcp | 4.3.5 | 7.5 | HIGH | Not Vulnerable | 2024-10-09 14:26:49 |