This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1.
BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-8124-1 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND 9: 9.20.21, 9.21.20, or 9.20.21-S1.
Workaround
Remove any TSIG keys that might be used by an attacker.
Wed, 25 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Under certain conditions, `named` may crash when processing a correctly signed query containing a TKEY record. The affected code can only be reached if an incoming request has a valid transaction signature (TSIG) from a key declared in the `named` configuration. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected. | |
| Title | Authenticated query containing a TKEY record may cause named to terminate unexpectedly | |
| First Time appeared |
Isc
Isc bind |
|
| Weaknesses | CWE-617 | |
| CPEs | cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Isc
Isc bind |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2026-03-25T14:13:54.588Z
Reserved: 2026-02-24T12:29:14.561Z
Link: CVE-2026-3119
Updated: 2026-03-25T14:13:48.560Z
Status : Awaiting Analysis
Published: 2026-03-25T14:16:37.097
Modified: 2026-03-25T15:41:33.977
Link: CVE-2026-3119
No data.
OpenCVE Enrichment
Updated: 2026-03-25T21:31:10Z
Ubuntu USN