CVE-2025-40775

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-40775
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40775.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-40775
Downstream
Related
Published
2025-05-21T13:16:02Z
Modified
2025-08-09T19:01:26Z
Summary
[none]
Details

When an incoming DNS protocol message includes a Transaction Signature (TSIG), BIND always checks it. If the TSIG contains an invalid value in the algorithm field, BIND immediately aborts with an assertion failure. This issue affects BIND 9 versions 9.20.0 through 9.20.8 and 9.21.0 through 9.21.7.

References

Affected packages