[ALSA-2025:21111] Important: bind9.18 security update
Type:
security
Severity:
important
Release date:
2025-12-01
Description:
BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. Security Fix(es): * bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778) * bind: Cache poisoning due to weak PRNG (CVE-2025-40780) * bind: Resource exhaustion via malformed DNSKEY handling (CVE-2025-8677) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 bind9.18-chroot-9.18.29-5.el9_7.2.aarch64.rpm 1f99aeaf1bd0a3904cc106e17ca2a3f84f7edd991e0a56ced5e4c5fb2929dd29
aarch64 bind9.18-libs-9.18.29-5.el9_7.2.aarch64.rpm 3bec9bd2716e5e4577401db616ea8344edaac29cb83c90c019a5979230e7c8ef
aarch64 bind9.18-devel-9.18.29-5.el9_7.2.aarch64.rpm 674cc3a154417043359b2b861b7f07411a08525453a292f7da38702c44f0e098
aarch64 bind9.18-dnssec-utils-9.18.29-5.el9_7.2.aarch64.rpm 8cd25f0906bd0cd81fa31b1b89630b4e9621e6a133369f01a213babe2fe3af83
aarch64 bind9.18-9.18.29-5.el9_7.2.aarch64.rpm a940025e2b3d2d8761ab048891149d12fda6c898074bc7bc64e307ae4974486d
aarch64 bind9.18-utils-9.18.29-5.el9_7.2.aarch64.rpm ba62f767dbaf1910c9687fbc0b6081263c9a3004942e2554b605780abe555b8a
i686 bind9.18-devel-9.18.29-5.el9_7.2.i686.rpm 13c38a9451de3c270d2b19a5071bbb20bab60b51c12f244daac39669b3466085
i686 bind9.18-libs-9.18.29-5.el9_7.2.i686.rpm 2a229b04ec9d1d0ba72823b91013ff6c6e4152e612554afdb29b4a0c2f574485
noarch bind9.18-doc-9.18.29-5.el9_7.2.noarch.rpm 3e89b39addd198c4c8835a6dd4053f4cd2690e3e639cf581ebcd64478a751bd8
ppc64le bind9.18-dnssec-utils-9.18.29-5.el9_7.2.ppc64le.rpm 08eb42c5b548a1c60cbd4558900a629691fb64b154bbf7d26850d81722d27b4c
ppc64le bind9.18-9.18.29-5.el9_7.2.ppc64le.rpm 1f79a7727c76c31cec8fc9f76d2024e770fcc8c63cb2e4767c0954edc4cb5791
ppc64le bind9.18-libs-9.18.29-5.el9_7.2.ppc64le.rpm 56cfbbfcf428bbb28447855e42f0bb3d909874d90735f46dab43f747322b61b4
ppc64le bind9.18-devel-9.18.29-5.el9_7.2.ppc64le.rpm 7f1f2f68359d54355804a387cd696e45c76787433cbdd05e74cae0b444cbac3b
ppc64le bind9.18-utils-9.18.29-5.el9_7.2.ppc64le.rpm d62222846305037fcbf66f888245c1d320b9e19ee68bad39ee97153d0ddfff43
ppc64le bind9.18-chroot-9.18.29-5.el9_7.2.ppc64le.rpm eaf47281fb940b0cfe36103c553f8a3f18d0b577ce81da4f9995fc9d7a66ce19
s390x bind9.18-chroot-9.18.29-5.el9_7.2.s390x.rpm 24ef0fab894466f48c42d8cd01b660e3f8e5b5d076856d864df68fb5303361c6
s390x bind9.18-utils-9.18.29-5.el9_7.2.s390x.rpm 3a9aacf252c4b2cbdef60601ba7081ad139c9352de15e721b1a6c964832935df
s390x bind9.18-devel-9.18.29-5.el9_7.2.s390x.rpm 3cdcf0fe72bee7ded0c13aa536124743b411c2e6cc741f0734ed644900bfb3f7
s390x bind9.18-libs-9.18.29-5.el9_7.2.s390x.rpm 4be2a5c9fbc4791ab0e36ad1fce73d05f8d2f93dda840f6ef84672435763f9c7
s390x bind9.18-dnssec-utils-9.18.29-5.el9_7.2.s390x.rpm e285b63704ca10b113a55547892fff0de0623da5ac5178aec88741beff903749
s390x bind9.18-9.18.29-5.el9_7.2.s390x.rpm ec6a2b0befe15257ced0422e1804c178afdd97e1fd755e594861f280ae242aef
x86_64 bind9.18-chroot-9.18.29-5.el9_7.2.x86_64.rpm 5644564721b3022a0853f5f39e6a02fe815f4b878780c9d549dbeff9abf54500
x86_64 bind9.18-dnssec-utils-9.18.29-5.el9_7.2.x86_64.rpm 920b71a3e129c749df81cc22f81c58bd66bbe2de77fe82381e763009d1afd46c
x86_64 bind9.18-utils-9.18.29-5.el9_7.2.x86_64.rpm 929e769e53961773b7eb66d0903c0d4f1250e944c7ca05345e50eca1649d735b
x86_64 bind9.18-libs-9.18.29-5.el9_7.2.x86_64.rpm adfad6da253924cb90dd84003786add5b9bed147fae9f17ad399da2b3c9e3612
x86_64 bind9.18-devel-9.18.29-5.el9_7.2.x86_64.rpm b8a0dea8b756d86e3ec853c7ac6ed1b1343e334f432c641bea75e0a3c10997a8
x86_64 bind9.18-9.18.29-5.el9_7.2.x86_64.rpm c3b820545f243add0757bfd54ce2ee26620a2395da436b3938576aecac9b046d
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.