DEBIAN-CVE-2026-3591

Source
https://security-tracker.debian.org/tracker/CVE-2026-3591
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3591.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-3591
Upstream
  • CVE-2026-3591
Published
2026-03-25T14:16:37.297Z
Modified
2026-03-29T00:02:54.127352Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A use-after-return vulnerability exists in the named server when handling DNS queries signed with SIG(0). Using a specially-crafted DNS request, an attacker may be able to cause an ACL to improperly (mis)match an IP address. In a default-allow ACL (denying only specific IP addresses), this may lead to unauthorized access. Default-deny ACLs should fail-secure. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.

References

Affected packages

Debian:13 / bind9

Package

Name
bind9
Purl
pkg:deb/debian/bind9?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:9.20.21-1~deb13u1

Affected versions

1:9.*
1:9.20.11-4
1:9.20.15-1~deb13u1~bpo12+1
1:9.20.15-1~deb13u1
1:9.20.15-1
1:9.20.15-2
1:9.20.18-1~deb13u1~bpo12+1
1:9.20.18-1~deb13u1
1:9.20.18-1
1:9.20.19-1~bpo12+1
1:9.20.19-1
1:9.20.20-1~bpo12+1
1:9.20.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3591.json"

Debian:14 / bind9

Package

Name
bind9
Purl
pkg:deb/debian/bind9?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:9.20.21-1

Affected versions

1:9.*
1:9.20.11-4
1:9.20.15-1~deb13u1~bpo12+1
1:9.20.15-1~deb13u1
1:9.20.15-1
1:9.20.15-2
1:9.20.18-1~deb13u1~bpo12+1
1:9.20.18-1~deb13u1
1:9.20.18-1
1:9.20.19-1~bpo12+1
1:9.20.19-1
1:9.20.20-1~bpo12+1
1:9.20.20-1
1:9.20.21-1~deb13u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3591.json"