When an incoming DNS protocol message includes a...
High severity
Unreviewed
Published
May 21, 2025
to the GitHub Advisory Database
•
Updated May 23, 2025
Description
Published by the National Vulnerability Database
May 21, 2025
Published to the GitHub Advisory Database
May 21, 2025
Last updated
May 23, 2025
When an incoming DNS protocol message includes a Transaction Signature (TSIG), BIND always checks it. If the TSIG contains an invalid value in the algorithm field, BIND immediately aborts with an assertion failure.
This issue affects BIND 9 versions 9.20.0 through 9.20.8 and 9.21.0 through 9.21.7.
References