[ALSA-2026:7915] Important: bind9.18 security update
Type:
security
Severity:
important
Release date:
2026-04-15
Description:
BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. Security Fix(es): * bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone (CVE-2026-1519) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 bind9.18-libs-9.18.29-5.el9_7.4.aarch64.rpm 26fe69eef48716eb348217a6266a4626ab4aa45f7624b722747c574056d6e08a
aarch64 bind9.18-devel-9.18.29-5.el9_7.4.aarch64.rpm 8d41a904e646060869759d7831748ac3bdef2884d1d140b38e20fdc599696918
aarch64 bind9.18-chroot-9.18.29-5.el9_7.4.aarch64.rpm 98b9dea790449733ca7df1957e7331b40c1c01e786eabaf5ba47fa13dd6a2e52
aarch64 bind9.18-utils-9.18.29-5.el9_7.4.aarch64.rpm d1c3f5304176e99190a5ab02554cb21cb9afa8454e5fdbdd2b8fe07496ade459
aarch64 bind9.18-dnssec-utils-9.18.29-5.el9_7.4.aarch64.rpm ec93eb8a8265f8ea81aa92a4bf84427371382d720c3d658e94356b373d0b8f98
aarch64 bind9.18-9.18.29-5.el9_7.4.aarch64.rpm fe2e23be27347a06db8c76767629a65fab31632c8122b7d3478488161af28554
i686 bind9.18-libs-9.18.29-5.el9_7.4.i686.rpm 7585304e8fe4999660a0d28374e33f8ff8d8e23b1aa56c95787568246408bfc5
i686 bind9.18-devel-9.18.29-5.el9_7.4.i686.rpm ebe6df1d732685af357a8d62a35147108c765fe47988b7887d903dc3292ebc2b
noarch bind9.18-doc-9.18.29-5.el9_7.4.noarch.rpm 9e325df1d0aa41c0f14eb50dcf97f2fe6e998789cba551763a254703171afd2c
ppc64le bind9.18-dnssec-utils-9.18.29-5.el9_7.4.ppc64le.rpm 310fcb689815160c186c3b936f85a6d8619b42ddcb4874d47a11746ff1b04b19
ppc64le bind9.18-devel-9.18.29-5.el9_7.4.ppc64le.rpm 522202e75ff28f51303abc6eb07ac217fab5e1a641536c53c82823303d9d3f95
ppc64le bind9.18-libs-9.18.29-5.el9_7.4.ppc64le.rpm 8aacd02e4ede87d63f0b61266940f0832c28eb6c3e41bb889f563b72f247cec9
ppc64le bind9.18-9.18.29-5.el9_7.4.ppc64le.rpm 9e130002dce0cf428c25166ca7aadde16bbf14f5b30fccc48e0c774964fe3bac
ppc64le bind9.18-utils-9.18.29-5.el9_7.4.ppc64le.rpm c3bea6e8c3ad7542a589a0f1afe51d2330dfed8198521700595397c9becef080
ppc64le bind9.18-chroot-9.18.29-5.el9_7.4.ppc64le.rpm f8301eb1336381fc883d19d626728e22e5cda5f59b034603aba53529945cda7a
s390x bind9.18-dnssec-utils-9.18.29-5.el9_7.4.s390x.rpm 55039b08f0be5b68e18664e7adaea9780d7cd9b255e8ada0bddfebfabb681b22
s390x bind9.18-chroot-9.18.29-5.el9_7.4.s390x.rpm 62ba7fde89b7eba9d2b072c294356ff11f6a482682035d49bd3176f104083e16
s390x bind9.18-devel-9.18.29-5.el9_7.4.s390x.rpm 691a49d3a0500ffd0de9e111261494ae5bb4ef1205b8549e8dddd541a8fe4be2
s390x bind9.18-utils-9.18.29-5.el9_7.4.s390x.rpm 6ef03db7f774251924f7e81834f24ec631c0a1ea6a29ad72efa6f058d278f51f
s390x bind9.18-9.18.29-5.el9_7.4.s390x.rpm 91920ed2e1bff6b25dde8648238f94960db9f80e9148d757e2c4ee5b271f1aeb
s390x bind9.18-libs-9.18.29-5.el9_7.4.s390x.rpm baebefba10e7a367b5826ee922abcf8bc317c4de585e8cfc256752dada784174
x86_64 bind9.18-devel-9.18.29-5.el9_7.4.x86_64.rpm 207426042703160f6306b26e1368348bfe721d1577dc5f50ecd17866fcbc66bf
x86_64 bind9.18-chroot-9.18.29-5.el9_7.4.x86_64.rpm 4304c320b1f40fbc0ffa32ed9764a47c1d5add7e346960daa2f5afd01d853eff
x86_64 bind9.18-dnssec-utils-9.18.29-5.el9_7.4.x86_64.rpm bf7a9c1038a416e847f39625e07ec426161298486bfbf82118e090b0b1450a74
x86_64 bind9.18-9.18.29-5.el9_7.4.x86_64.rpm cd55142ef3fceb2856b6e212739b5a2a7de3a93cc1e83d16aba48e5ce08e1717
x86_64 bind9.18-libs-9.18.29-5.el9_7.4.x86_64.rpm da8c984b448ea15f284656f093d9420665cc3573146bbc7eb0b494f1574c1ccc
x86_64 bind9.18-utils-9.18.29-5.el9_7.4.x86_64.rpm ef415e1d0fa583813be97ef53374eb4da4adc65b04320b58f689c103a5f2455e
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.