Bug 2405830 (CVE-2025-8677) - CVE-2025-8677 bind: Resource exhaustion via malformed DNSKEY handling
Summary: CVE-2025-8677 bind: Resource exhaustion via malformed DNSKEY handling
Keywords:
Status: NEW
Alias: CVE-2025-8677
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2394406 2405831 2405832 2405833 2405834
Blocks: 2406399 2413070 2413104
TreeView+ depends on / blocked
 
Reported: 2025-10-22 15:24 UTC by OSIDB Bzimport
Modified: 2025-12-17 08:48 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Internet Systems Consortium (ISC) isc-projects bind9 issues 5622 0 None opened Validation of domains signed by unsupported and supported algorithm started failing 2025-11-04 19:04:47 UTC
Red Hat Product Errata RHSA-2025:19912 0 None None None 2025-11-06 15:39:27 UTC
Red Hat Product Errata RHSA-2025:19950 0 None None None 2025-11-10 02:34:18 UTC
Red Hat Product Errata RHSA-2025:21034 0 None None None 2025-11-11 19:49:27 UTC
Red Hat Product Errata RHSA-2025:21111 0 None None None 2025-11-12 10:35:01 UTC

Description OSIDB Bzimport 2025-10-22 15:24:50 UTC
Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion.

Comment 2 Petr Menšík 2025-11-04 19:04:48 UTC
There were reported regressions shortly after release of 9.18.41 and 9.20.15 version.

Our builds should have them fixed. It failed on RHEL9 or RHEL10, where SHA-1 based signatures are considered insecure. When the domain is signed with both unsupported algorithm (such as 5 or 7) and supported algorithm at the same time, it resulted in SERVFAIL after CVE fixes applied.

https://gitlab.isc.org/isc-projects/bind9/-/issues/5622
https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/11202

Comment 3 errata-xmlrpc 2025-11-06 15:39:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:19912 https://access.redhat.com/errata/RHSA-2025:19912

Comment 4 errata-xmlrpc 2025-11-10 02:34:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:19950 https://access.redhat.com/errata/RHSA-2025:19950

Comment 5 errata-xmlrpc 2025-11-11 19:49:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:21034 https://access.redhat.com/errata/RHSA-2025:21034

Comment 6 errata-xmlrpc 2025-11-12 10:34:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:21111 https://access.redhat.com/errata/RHSA-2025:21111


Note You need to log in before you can comment on or make changes to this bug.