This issue affects BIND 9 versions 9.18.36 through 9.18.48, 9.20.8 through 9.20.22, 9.21.7 through 9.21.21, 9.18.36-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6285-1 | bind9 security update |
Ubuntu USN |
USN-8293-1 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.49, 9.20.23, 9.21.22, 9.18.49-S1, or 9.20.23-S1.
Workaround
No workarounds known.
Thu, 21 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* |
Wed, 20 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unbounded resend loop vulnerability exists in the BIND 9 resolver state machine during bad-server handling, enabling a remote unauthenticated attacker to cause severe resource exhaustion by sending queries that trigger specific retry conditions. This issue affects BIND 9 versions 9.18.36 through 9.18.48, 9.20.8 through 9.20.22, 9.21.7 through 9.21.21, 9.18.36-S1 through 9.18.48-S1, and 9.20.9-S1 through 9.20.22-S1. | |
| Title | Unbounded resend loop in BIND 9 resolver | |
| First Time appeared |
Isc
Isc bind |
|
| Weaknesses | CWE-606 | |
| CPEs | cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Isc
Isc bind |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2026-05-20T13:38:53.211Z
Reserved: 2026-04-09T06:42:23.953Z
Link: CVE-2026-5950
Updated: 2026-05-20T13:38:44.672Z
Status : Analyzed
Published: 2026-05-20T13:16:40.450
Modified: 2026-05-21T15:24:34.667
Link: CVE-2026-5950
No data.
OpenCVE Enrichment
Updated: 2026-05-20T19:00:06Z
Debian DSA
Ubuntu USN