Bug 2451305 (CVE-2026-1519) - CVE-2026-1519 bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone
Summary: CVE-2026-1519 bind: BIND: Denial of Service via maliciously crafted DNSSEC-va...
Keywords:
Status: NEW
Alias: CVE-2026-1519
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2451360 2451361
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-25 14:02 UTC by OSIDB Bzimport
Modified: 2026-03-25 16:15 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-25 14:02:20 UTC
If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers may make recursive queries (see: https://kb.isc.org/docs/why-does-my-authoritative-server-make-recursive-queries).
This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.46, 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.46-S1, and 9.20.9-S1 through 9.20.20-S1.


Note You need to log in before you can comment on or make changes to this bug.