bind-9.16.23-34.el9_7.2
エラータID: AXSA:2026-440:01
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone (CVE-2026-1519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-1519
If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers may make recursive queries (see: https://kb.isc.org/docs/why-does-my-authoritative-server-make-recursive-...). This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.46, 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.46-S1, and 9.20.9-S1 through 9.20.20-S1.
Update packages.
If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers may make recursive queries (see: https://kb.isc.org/docs/why-does-my-authoritative-server-make-recursive-queries). This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.46, 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.46-S1, and 9.20.9-S1 through 9.20.20-S1.
N/A
SRPMS
- bind-9.16.23-34.el9_7.2.src.rpm
MD5: 8088cf4579d550ba9229e5ed97f41814
SHA-256: ccdb2962f68fbed268e37e1dfefff90eb6366c106fba11fdc826fea82d684c71
Size: 5.11 MB
Asianux Server 9 for x86_64
- bind-9.16.23-34.el9_7.2.x86_64.rpm
MD5: 3b4e0eb2afabffaff19373f5a6e8bc44
SHA-256: 49f34c285b072dfeb37046b3d07254bfceb09c6957204ea08a066c2f0d3a6e1c
Size: 498.78 kB - bind-chroot-9.16.23-34.el9_7.2.x86_64.rpm
MD5: 10272f9f021609883dbb7693082f8aef
SHA-256: bfa66cffa082f9995f1651d139077a49e9c9c99eae3cd7fa4c901910fb10c5b1
Size: 15.75 kB - bind-devel-9.16.23-34.el9_7.2.i686.rpm
MD5: f167479a59b6607ee44e39b521f7b5de
SHA-256: 936eda8c710f1f2458804a39976967664317a95c979a14ec3ba6dc548e1a4df4
Size: 359.25 kB - bind-devel-9.16.23-34.el9_7.2.x86_64.rpm
MD5: 400794cf213598ec2fd96beaf7ed425b
SHA-256: 485f4545da2f901e795e905d20d3b672fb5683b03f2f0e04a4c49b117e289fb4
Size: 359.27 kB - bind-dnssec-doc-9.16.23-34.el9_7.2.noarch.rpm
MD5: aa01e638a67157ccabef45bd8d19d61b
SHA-256: af80b0b6f4cd52414d6df5bff39ef4b0d33bb125918d4dfac49494b5c919f1a0
Size: 44.33 kB - bind-dnssec-utils-9.16.23-34.el9_7.2.x86_64.rpm
MD5: c94f0a9f3956d9515ca439335922e772
SHA-256: a300948190cec64821bce48145d83ea63064627537a034bd5b5decd8cab83f99
Size: 111.75 kB - bind-doc-9.16.23-34.el9_7.2.noarch.rpm
MD5: 2a83c8085f942473637010d1c2530c20
SHA-256: 21c086b0b9880cd7c764d2e954cab392ff58d3ea26b840f340578fc848583c14
Size: 2.08 MB - bind-libs-9.16.23-34.el9_7.2.i686.rpm
MD5: c9268fdc007d8f0135f887444fea1257
SHA-256: f91dd7eea2bda952d26fa50053c8e58889e9db4332c9c3a120af408cf0b3834a
Size: 1.34 MB - bind-libs-9.16.23-34.el9_7.2.x86_64.rpm
MD5: 1b90818424223e79864337f4a2b996a2
SHA-256: 75d70b75f0d4736af0f9daab6792317a44d90d382a6f6f0ace1fcb09d36e70dc
Size: 1.24 MB - bind-license-9.16.23-34.el9_7.2.noarch.rpm
MD5: 739eecbe8e6503d143e6c5512172666e
SHA-256: 7c64c49aea66c91f661fb863404b7c69a6ce9e71b0ebe296056a1eca13347ea7
Size: 11.86 kB - bind-utils-9.16.23-34.el9_7.2.x86_64.rpm
MD5: 35efba4d3030643ebb978162afbf137b
SHA-256: 38f5311efc6f5a63e17b8106c8c785f1b9853a1bad2c26aede19ae68bcb96493
Size: 204.38 kB - python3-bind-9.16.23-34.el9_7.2.noarch.rpm
MD5: c7e8a565b9bea09a850efc181d769f47
SHA-256: 5440c2d29b1cd39051490072cb0301d6e34d34d341883aff64629da2bf2b1345
Size: 70.57 kB