{"id":"USN-6665-1","summary":"unbound vulnerabilities","details":"Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered\nthat Unbound incorrectly handled validating DNSSEC messages. A remote\nattacker could possibly use this issue to cause Unbound to consume\nresources, leading to a denial of service. (CVE-2023-50387)\n\nIt was discovered that Unbound incorrectly handled preparing an NSEC3\nclosest encloser proof. A remote attacker could possibly use this issue to\ncause Unbound to consume resources, leading to a denial of service.\n(CVE-2023-50868)\n","modified":"2026-02-10T04:43:31Z","published":"2024-02-28T13:10:23Z","related":["UBUNTU-CVE-2023-50387","UBUNTU-CVE-2023-50868"],"upstream":["CVE-2023-50387","CVE-2023-50868","UBUNTU-CVE-2023-50387","UBUNTU-CVE-2023-50868"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6665-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-50387"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-50868"}],"affected":[{"package":{"name":"unbound","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/unbound@1.9.4-2ubuntu1.5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.9.4-2ubuntu1.5"}]}],"versions":["1.9.0-2ubuntu1","1.9.0-2ubuntu2","1.9.4-2","1.9.4-2ubuntu1","1.9.4-2ubuntu1.1","1.9.4-2ubuntu1.2","1.9.4-2ubuntu1.3","1.9.4-2ubuntu1.4"],"ecosystem_specific":{"binaries":[{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"libunbound-dev"},{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"libunbound8"},{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"python-unbound"},{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"python3-unbound"},{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"unbound"},{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"unbound-anchor"},{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"unbound-host"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6665-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-50387"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-50868"}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"unbound","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/unbound@1.13.1-1ubuntu5.4?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.13.1-1ubuntu5.4"}]}],"versions":["1.13.1-1ubuntu1","1.13.1-1ubuntu3","1.13.1-1ubuntu5","1.13.1-1ubuntu5.1","1.13.1-1ubuntu5.2","1.13.1-1ubuntu5.3"],"ecosystem_specific":{"binaries":[{"binary_version":"1.13.1-1ubuntu5.4","binary_name":"libunbound-dev"},{"binary_version":"1.13.1-1ubuntu5.4","binary_name":"libunbound8"},{"binary_version":"1.13.1-1ubuntu5.4","binary_name":"python3-unbound"},{"binary_version":"1.13.1-1ubuntu5.4","binary_name":"unbound"},{"binary_version":"1.13.1-1ubuntu5.4","binary_name":"unbound-anchor"},{"binary_version":"1.13.1-1ubuntu5.4","binary_name":"unbound-host"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6665-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-50387"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-50868"}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.3"}