{"id":"USN-6665-1","summary":"unbound vulnerabilities","details":"Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered\nthat Unbound incorrectly handled validating DNSSEC messages. A remote\nattacker could possibly use this issue to cause Unbound to consume\nresources, leading to a denial of service. (CVE-2023-50387)\n\nIt was discovered that Unbound incorrectly handled preparing an NSEC3\nclosest encloser proof. A remote attacker could possibly use this issue to\ncause Unbound to consume resources, leading to a denial of service.\n(CVE-2023-50868)\n","modified":"2026-04-22T10:44:54.981235Z","published":"2024-02-28T13:10:23Z","related":["UBUNTU-CVE-2023-50387","UBUNTU-CVE-2023-50868"],"upstream":["CVE-2023-50387","CVE-2023-50868","UBUNTU-CVE-2023-50387","UBUNTU-CVE-2023-50868"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6665-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-50387"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-50868"}],"affected":[{"package":{"name":"unbound","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/unbound@1.9.4-2ubuntu1.5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.9.4-2ubuntu1.5"}]}],"versions":["1.9.0-2ubuntu1","1.9.0-2ubuntu2","1.9.4-2","1.9.4-2ubuntu1","1.9.4-2ubuntu1.1","1.9.4-2ubuntu1.2","1.9.4-2ubuntu1.3","1.9.4-2ubuntu1.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"libunbound8"},{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"python-unbound"},{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"python3-unbound"},{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"unbound"},{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"unbound-anchor"},{"binary_version":"1.9.4-2ubuntu1.5","binary_name":"unbound-host"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2023-50387","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-50868","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6665-1.json"}},{"package":{"name":"unbound","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/unbound@1.13.1-1ubuntu5.4?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.13.1-1ubuntu5.4"}]}],"versions":["1.13.1-1ubuntu1","1.13.1-1ubuntu3","1.13.1-1ubuntu5","1.13.1-1ubuntu5.1","1.13.1-1ubuntu5.2","1.13.1-1ubuntu5.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.13.1-1ubuntu5.4","binary_name":"libunbound8"},{"binary_version":"1.13.1-1ubuntu5.4","binary_name":"python3-unbound"},{"binary_version":"1.13.1-1ubuntu5.4","binary_name":"unbound"},{"binary_version":"1.13.1-1ubuntu5.4","binary_name":"unbound-anchor"},{"binary_version":"1.13.1-1ubuntu5.4","binary_name":"unbound-host"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2023-50387","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-50868","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6665-1.json"}}],"schema_version":"1.7.5"}