#VU124613 Operation on a Resource after Expiration or Release in ISC BIND - CVE-2026-3591
Published: March 25, 2026
ISC BIND
ISC
Description
The vulnerability allows a remote user to bypass access controls.
The vulnerability exists due to a use-after-return error in the SIG(0) handling code in named when processing specially crafted DNS queries. A remote user can send a specially crafted DNS request to cause an ACL to improperly (mis)match an IP address, potentially leading to unauthorized access in default-allow ACL configurations.
Authoritative servers and resolvers are affected. In a default-allow ACL (which denies only specific IP addresses), this may lead to unauthorized access. Default-deny ACLs should fail securely.