CVE-2023-50868
Publication date 13 February 2024
Last updated 24 July 2024
Ubuntu priority
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
Status
Package | Ubuntu Release | Status |
---|---|---|
bind9 | 24.10 oracular |
Fixed 1:9.18.24-0ubuntu1
|
24.04 LTS noble |
Fixed 1:9.18.24-0ubuntu1
|
|
22.04 LTS jammy |
Fixed 1:9.18.18-0ubuntu0.22.04.2
|
|
20.04 LTS focal |
Fixed 1:9.16.48-0ubuntu0.20.04.1
|
|
18.04 LTS bionic |
Fixed 1:9.11.3+dfsg-1ubuntu1.19+esm3
|
|
16.04 LTS xenial |
Fixed 1:9.10.3.dfsg.P4-8ubuntu1.19+esm8
|
|
14.04 LTS trusty |
Fixed 1:9.9.5.dfsg-3ubuntu0.19+esm12
|
|
bind9-libs | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
dnsmasq | 24.10 oracular |
Fixed 2.90-1
|
24.04 LTS noble |
Fixed 2.90-1
|
|
22.04 LTS jammy |
Fixed 2.90-0ubuntu0.22.04.1
|
|
20.04 LTS focal |
Fixed 2.90-0ubuntu0.20.04.1
|
|
18.04 LTS bionic |
Fixed 2.90-0ubuntu0.18.04.1+esm1
|
|
16.04 LTS xenial |
Fixed 2.90-0ubuntu0.16.04.1+esm1
|
|
14.04 LTS trusty |
Needs evaluation
|
|
isc-dhcp | 24.10 oracular |
Needs evaluation
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
knot-resolver | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Vulnerable, work in progress
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty | Not in release | |
pdns-recursor | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Vulnerable, work in progress
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty | Ignored end of standard support | |
unbound | 24.10 oracular |
Fixed 1.19.1-1ubuntu1
|
24.04 LTS noble |
Fixed 1.19.1-1ubuntu1
|
|
22.04 LTS jammy |
Fixed 1.13.1-1ubuntu5.4
|
|
20.04 LTS focal |
Fixed 1.9.4-2ubuntu1.5
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty |
Needs evaluation
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
alexmurray
As of isc-dhcp-4.4.3-1, isc-dhcp vendors bind9 libs
mdeslaur
This is unlikely to affect isc-dhcp's use of bind9-libs and the vendored bind9 libs, marking as negligible
References
Related Ubuntu Security Notices (USN)
- USN-6633-1
- Bind vulnerabilities
- 13 February 2024
- USN-6642-1
- Bind vulnerabilities
- 19 February 2024
- USN-6657-1
- Dnsmasq vulnerabilities
- 26 February 2024
- USN-6665-1
- Unbound vulnerabilities
- 28 February 2024
- USN-6723-1
- Bind vulnerabilities
- 9 April 2024
- USN-6657-2
- Dnsmasq vulnerabilities
- 24 April 2024
Other references
- https://kb.isc.org/docs/cve-2023-50868
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
- https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
- https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
- https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
- https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
- https://www.cve.org/CVERecord?id=CVE-2023-50868