]> git.ipfire.org Git - thirdparty/bind9.git/commit
[CVE-2025-40778] sec: usr: Address various spoofing attacks
authorMichał Kępień <michal@isc.org>
Thu, 2 Oct 2025 11:24:53 +0000 (13:24 +0200)
committerMichał Kępień <michal@isc.org>
Thu, 2 Oct 2025 11:24:53 +0000 (13:24 +0200)
commit7b95c382dbd6b016d11ab3c7d547a3e17153d065
tree3b82c730d3cae7b260d09fe56e5d427366115615
parent1d851c235291da1262e6e1254c2b5017253e0242
parent2e40705c06831988106335ed77db3cf924d431f6
[CVE-2025-40778] sec: usr: Address various spoofing attacks

Previously, several issues could be exploited to poison a DNS cache with
spoofed records for zones which were not DNSSEC-signed or if the
resolver was configured to not do DNSSEC validation. These issues were
assigned CVE-2025-40778 and have now been fixed.

As an additional layer of protection, :iscman:`named` no longer accepts
DNAME records or extraneous NS records in the AUTHORITY section unless
these are received via spoofing-resistant transport (TCP, UDP with DNS
cookies, TSIG, or SIG(0)).

ISC would like to thank Yuxiao Wu, Yunyi Zhang, Baojun Liu, and Haixin
Duan from Tsinghua University for bringing this vulnerability to our
attention.

Closes isc-projects/bind9#5414

Merge branch '5414-security-check-name-vs-qname-again' into 'v9.21.13-release'

See merge request isc-private/bind9!838