CVE-2026-3119

EUVD-2026-15411
Under certain conditions, `named` may crash when processing a correctly signed query containing a TKEY record. The affected code can only be reached if an incoming request has a valid transaction signature (TSIG) from a key declared in the `named` configuration.
This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1.
BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 2%
Debian logo
Debian Releases
Debian Product
Codename
bind9
bookworm
1:9.18.41-1~deb12u1
fixed
bookworm (security)
1:9.18.47-1~deb12u1
fixed
bullseye
1:9.16.50-1~deb11u2
fixed
bullseye (security)
1:9.16.50-1~deb11u5
fixed
forky
1:9.20.22-1
fixed
sid
1:9.20.22-1
fixed
trixie
vulnerable
trixie (security)
1:9.20.21-1~deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
bind9
bionic
not-affected
focal
not-affected
jammy
not-affected
noble
not-affected
questing
Fixed 1:9.20.11-1ubuntu2.2
released
resolute
not-affected
trusty
not-affected
xenial
not-affected
isc-dhcp
bionic
needs-triage
focal
not-affected
jammy
not-affected
noble
needs-triage
questing
needs-triage
resolute
needs-triage
trusty
not-affected
xenial
not-affected
bind9-libs
focal
needs-triage
jammy
needs-triage
noble
dne
questing
dne
resolute
dne
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
bind
suse enterprise sap 15 SP7
9.20.21-150700.3.18.1
fixed
suse enterprise server 15 SP7
9.20.21-150700.3.18.1
fixed
bind-doc
suse enterprise sap 15 SP7
9.20.21-150700.3.18.1
fixed
suse enterprise server 15 SP7
9.20.21-150700.3.18.1
fixed