Skip to content

Conversation

@nmeyerhans
Copy link
Contributor

📦 Package Details

Maintainer: me

Description:
Addresses the following security issues:

  • CVE-2025-8677: DNSSEC validation fails if matching but invalid DNSKEY is found.
  • CVE-2025-40778: Address various spoofing attacks.
  • CVE-2025-40780: Cache-poisoning due to weak pseudo-random number generator.

Full upstream changelog at
https://ftp.isc.org/isc/bind9/9.18.41/doc/arm/html/changelog.html


🧪 Run Testing Details

  • OpenWrt Version: 23.05
  • OpenWrt Target/Subtarget: malta
  • OpenWrt Device: qemu

✅ Formalities

  • I have reviewed the CONTRIBUTING.md file for detailed contributing guidelines.

If your PR contains a patch:

  • It can be applied using git am
  • It has been refreshed to avoid offsets, fuzzes, etc., using
    make package/<your-package>/refresh V=s
  • It is structured in a way that it is potentially upstreamable
    (e.g., subject line, commit description, etc.)
    We must try to upstream patches to reduce maintenance burden.

Addresses the following security issues:
- CVE-2025-8677: DNSSEC validation fails if matching but invalid
  DNSKEY is found.
- CVE-2025-40778: Address various spoofing attacks.
- CVE-2025-40780: Cache-poisoning due to weak pseudo-random number
  generator.

Full upstream changelog at
https://ftp.isc.org/isc/bind9/9.18.41/doc/arm/html/changelog.html

Signed-off-by: Noah Meyerhans <[email protected]>
@BKPepe BKPepe added the OpenWrt 23.05 (end of support) Issue/PR on branch 23.05 label Oct 23, 2025
@nmeyerhans nmeyerhans merged commit a2d5613 into openwrt:openwrt-23.05 Oct 23, 2025
16 of 22 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants