SB20260325210 - Fedora 42 update for bind9-next
Published: March 25, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Resource exhaustion (CVE-ID: CVE-2026-1519)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to improper input validation in the DNSSEC validation component when handling NSEC3 records during insecure delegation validation. A remote attacker can send a specially crafted DNS zone response to cause excessive CPU load on the resolver.
Resolvers performing DNSSEC validation are affected; authoritative-only servers are generally not affected unless they perform recursive queries.
2) Missing release of memory after effective lifetime (CVE-ID: CVE-2026-3104)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to improper memory management in the DNSSEC proof preparation component when handling recursive queries for a specially crafted domain. A remote attacker can send a specially crafted domain query to cause unbounded memory consumption, leading to an out-of-memory condition and potential service termination during shutdown or reload.
Resolvers are affected; authoritative servers may be at risk if they perform recursive queries.
3) Improper Check or Handling of Exceptional Conditions (CVE-ID: CVE-2026-3119)
The vulnerability allows a remote user to cause a denial of service.
The vulnerability exists due to improper handling of TKEY records in the DNS query processing component when processing a signed query containing a TKEY record. A remote user can send a specially crafted, correctly signed query containing a TKEY record to cause named to terminate unexpectedly.
Successful exploitation requires that the attacker possesses a valid TSIG key configured in the target's named configuration. Both authoritative servers and resolvers are affected.
4) Operation on a Resource after Expiration or Release (CVE-ID: CVE-2026-3591)
The vulnerability allows a remote user to bypass access controls.
The vulnerability exists due to a use-after-return error in the SIG(0) handling code in named when processing specially crafted DNS queries. A remote user can send a specially crafted DNS request to cause an ACL to improperly (mis)match an IP address, potentially leading to unauthorized access in default-allow ACL configurations.
Authoritative servers and resolvers are affected. In a default-allow ACL (which denies only specific IP addresses), this may lead to unauthorized access. Default-deny ACLs should fail securely.
Remediation
Install update from vendor's website.