vulnerability
Huawei EulerOS: CVE-2023-50387: systemd security update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | 02/14/2024 | 07/01/2024 | 03/18/2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
02/14/2024
Added
07/01/2024
Modified
03/18/2025
Description
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
Solution(s)
huawei-euleros-2_0_sp12-upgrade-systemdhuawei-euleros-2_0_sp12-upgrade-systemd-containerhuawei-euleros-2_0_sp12-upgrade-systemd-libshuawei-euleros-2_0_sp12-upgrade-systemd-networkdhuawei-euleros-2_0_sp12-upgrade-systemd-nspawnhuawei-euleros-2_0_sp12-upgrade-systemd-pamhuawei-euleros-2_0_sp12-upgrade-systemd-resolvedhuawei-euleros-2_0_sp12-upgrade-systemd-timesyncdhuawei-euleros-2_0_sp12-upgrade-systemd-udevhuawei-euleros-2_0_sp12-upgrade-systemd-udev-compat

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.