[ALSA-2025:19912] Important: bind security update
Type:
security
Severity:
important
Release date:
2025-11-10
Description:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778) * bind: Cache poisoning due to weak PRNG (CVE-2025-40780) * bind: Resource exhaustion via malformed DNSKEY handling (CVE-2025-8677) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
noarch bind-license-9.18.33-4.el10_0.2.noarch.rpm bb81e250595f5da9b569c3ac03115910f28d9faa14c99e5296e260b6950a565f
noarch bind-doc-9.18.33-4.el10_0.2.noarch.rpm f3b77d17c084a53a89188b9e49368a24d1a2220f32e1750e2a2311568c4f9b2a
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.