]> git.ipfire.org Git - thirdparty/bind9.git/commitdiff
[9.16] [CVE-2025-40778] sec: usr: Address various spoofing attacks
authorMichał Kępień <michal@isc.org>
Wed, 22 Oct 2025 16:41:51 +0000 (18:41 +0200)
committerMichał Kępień <michal@isc.org>
Wed, 22 Oct 2025 16:41:51 +0000 (18:41 +0200)
Previously, several issues could be exploited to poison a DNS cache with
spoofed records for zones which were not DNSSEC-signed or if the
resolver was configured to not do DNSSEC validation. These issues were
assigned CVE-2025-40778 and have now been fixed.

As an additional layer of protection, :iscman:`named` no longer accepts
DNAME records or extraneous NS records in the AUTHORITY section unless
these are received via spoofing-resistant transport (TCP, UDP with DNS
cookies, TSIG, or SIG(0)).

ISC would like to thank Yuxiao Wu, Yunyi Zhang, Baojun Liu, and Haixin
Duan from Tsinghua University for bringing this vulnerability to our
attention.

Backport of !838

Closes isc-projects/bind9#5414

Merge branch '5414-security-check-name-vs-qname-again-9.16' into 'bind-9.16-release'

See merge request isc-private/bind9!859


Trivial merge