Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion.
There were reported regressions shortly after release of 9.18.41 and 9.20.15 version. Our builds should have them fixed. It failed on RHEL9 or RHEL10, where SHA-1 based signatures are considered insecure. When the domain is signed with both unsupported algorithm (such as 5 or 7) and supported algorithm at the same time, it resulted in SERVFAIL after CVE fixes applied. https://gitlab.isc.org/isc-projects/bind9/-/issues/5622 https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/11202