CVE-2025-40775
21.05.2025, 13:16
When an incoming DNS protocol message includes a Transaction Signature (TSIG), BIND always checks it. If the TSIG contains an invalid value in the algorithm field, BIND immediately aborts with an assertion failure. This issue affects BIND 9 versions 9.20.0 through 9.20.8 and 9.21.0 through 9.21.7.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
bind9 |
| ||||||||||||||||
bind9-libs |
| ||||||||||||||||
isc-dhcp |
|
Common Weakness Enumeration
Vulnerability Media Exposure