]> git.ipfire.org Git - thirdparty/bind9.git/commit
[9.16] [CVE-2025-40778] sec: usr: Address various spoofing attacks
authorMichał Kępień <michal@isc.org>
Wed, 22 Oct 2025 16:41:51 +0000 (18:41 +0200)
committerMichał Kępień <michal@isc.org>
Wed, 22 Oct 2025 16:41:51 +0000 (18:41 +0200)
commitaba2fa7e355be5a5c25d61c51238ea16d231b577
treef198fcfa0aaf9db43eaa917b0368517e42971b07
parente4c96c4975d50f02b9d8f0c034c893f5dfd234b6
parent33a7db1fe964e55b76b4ac003ecc56cc67028bd9
[9.16] [CVE-2025-40778] sec: usr: Address various spoofing attacks

Previously, several issues could be exploited to poison a DNS cache with
spoofed records for zones which were not DNSSEC-signed or if the
resolver was configured to not do DNSSEC validation. These issues were
assigned CVE-2025-40778 and have now been fixed.

As an additional layer of protection, :iscman:`named` no longer accepts
DNAME records or extraneous NS records in the AUTHORITY section unless
these are received via spoofing-resistant transport (TCP, UDP with DNS
cookies, TSIG, or SIG(0)).

ISC would like to thank Yuxiao Wu, Yunyi Zhang, Baojun Liu, and Haixin
Duan from Tsinghua University for bringing this vulnerability to our
attention.

Backport of !838

Closes isc-projects/bind9#5414

Merge branch '5414-security-check-name-vs-qname-again-9.16' into 'bind-9.16-release'

See merge request isc-private/bind9!859