CVE-2025-40780
Publication date 22 October 2025
Last updated 12 November 2025
Ubuntu priority
Cvss 3 Severity Score
Description
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| bind9 | 25.10 questing |
Fixed 1:9.20.11-1ubuntu2.1
|
| 25.04 plucky |
Fixed 1:9.20.11-0ubuntu0.2
|
|
| 24.04 LTS noble |
Fixed 1:9.18.39-0ubuntu0.24.04.2
|
|
| 22.04 LTS jammy |
Fixed 1:9.18.39-0ubuntu0.22.04.2
|
|
| 20.04 LTS focal |
Fixed 1:9.18.30-0ubuntu0.20.04.2+esm1
|
|
| 18.04 LTS bionic |
Vulnerable
|
|
| 16.04 LTS xenial |
Needs evaluation
|
|
| 14.04 LTS trusty |
Needs evaluation
|
|
| isc-dhcp | 25.10 questing |
Needs evaluation
|
| 25.04 plucky |
Needs evaluation
|
|
| 24.04 LTS noble |
Needs evaluation
|
|
| 22.04 LTS jammy |
Not affected
|
|
| 20.04 LTS focal |
Not affected
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Not affected
|
|
| 14.04 LTS trusty |
Not affected
|
|
| bind9-libs | 25.10 questing | Not in release |
| 25.04 plucky | Not in release | |
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy |
Needs evaluation
|
|
| 20.04 LTS focal |
Needs evaluation
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialNotes
alexmurray
As of isc-dhcp-4.4.3-1, isc-dhcp vendors bind9 libs
mdeslaur
in focal and jammy, isc-dhcp uses the bind9-libs package per upstream, 9.16+, need to check This is unlikely to affect isc-dhcp's use of bind9-libs and the vendored bind9 libs, marking as negligible
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Changed |
| Confidentiality | None |
| Integrity impact | High |
| Availability impact | None |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-7836-1
- Bind vulnerabilities
- 22 October 2025
- USN-7836-2
- Bind vulnerabilities
- 12 November 2025