bind9.16-9.16.23-0.22.el8_10.5
エラータID: AXSA:2026-453:01
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone (CVE-2026-1519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-1519
If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers may make recursive queries (see: https://kb.isc.org/docs/why-does-my-authoritative-server-make-recursive-...). This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.46, 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.46-S1, and 9.20.9-S1 through 9.20.20-S1.
Update packages.
If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers may make recursive queries (see: https://kb.isc.org/docs/why-does-my-authoritative-server-make-recursive-queries). This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.46, 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.46-S1, and 9.20.9-S1 through 9.20.20-S1.
N/A
SRPMS
- bind9.16-9.16.23-0.22.el8_10.5.src.rpm
MD5: 2f307f8dc24f4eeb3d566899c4d15ac3
SHA-256: f58ab86c9866cb25616f0647bb413d9c3f262fd3b14ffbc6a4b0bccc38eb997a
Size: 5.17 MB
Asianux Server 8 for x86_64
- bind9.16-9.16.23-0.22.el8_10.5.x86_64.rpm
MD5: dd1eeff5f5a39eaa63a7bd66e04c6f7c
SHA-256: 511480daed8c611bfb371890853bd199e44f9711f900e186e38963b892be87e0
Size: 604.89 kB - bind9.16-chroot-9.16.23-0.22.el8_10.5.x86_64.rpm
MD5: a655c53926cef51d7fe99412583705b9
SHA-256: 3f61e779a7ec67ace9ca1ca38534ee56768f96ea7f8004a2a9b298e99225c6ff
Size: 112.72 kB - bind9.16-devel-9.16.23-0.22.el8_10.5.i686.rpm
MD5: 106f67bb26f6ec12fd79139ab176a06b
SHA-256: 7071c5fe2615e0aa0e09d381d57ffc41227b174aa4c8a9b3d6bf67ef5bf7d4e6
Size: 428.87 kB - bind9.16-devel-9.16.23-0.22.el8_10.5.x86_64.rpm
MD5: d79c554e1fdd75091fe44e355174606d
SHA-256: 0bbd945e92a6c89ed4ba2e888e7874a114272ecc74df8eb332288239e64e6ef8
Size: 428.84 kB - bind9.16-dnssec-utils-9.16.23-0.22.el8_10.5.x86_64.rpm
MD5: b318ef644bfd10ebe56681bde7bacd94
SHA-256: 80771ddfd49b396f17ad22b4800cc4d82ab7fa946b2e99c6029b4f47e4d944d5
Size: 245.89 kB - bind9.16-doc-9.16.23-0.22.el8_10.5.noarch.rpm
MD5: 2f780a58755ee424c18e0f3ee0041358
SHA-256: 4377dee393a5504e11abb572bb5b30b9cadaa5275ba82406df4996ab5b8194af
Size: 3.67 MB - bind9.16-libs-9.16.23-0.22.el8_10.5.i686.rpm
MD5: 5d727dada0f0876fe83a4442b5a72719
SHA-256: 8dfdeaa4f8a77f65c8dcc1aeb534933dc1676324b822742042ad76412fd1ad71
Size: 1.46 MB - bind9.16-libs-9.16.23-0.22.el8_10.5.x86_64.rpm
MD5: 70c42a18a326db5be2a0e248bdc05afe
SHA-256: cbe4d77256de84ed502c578edd01cccacbc5cbaa3f52fa29b88c7c568f414988
Size: 1.36 MB - bind9.16-license-9.16.23-0.22.el8_10.5.noarch.rpm
MD5: 21d5feb01143d73971a964fa3652db7a
SHA-256: 23ea85ba548f65f520ab7aa8eadbfd6103358f2ceb886a3f191a4cadcab61d23
Size: 108.96 kB - bind9.16-utils-9.16.23-0.22.el8_10.5.x86_64.rpm
MD5: 6cab04ecb7e1c57a6c4da61e8944d07c
SHA-256: a3d3843057305507f11285dd164f1a4989fd6c99210d3787d6ee524637c0b086
Size: 291.07 kB - python3-bind9.16-9.16.23-0.22.el8_10.5.noarch.rpm
MD5: 505034580b7b3ac47e3a75089a31113b
SHA-256: f4e7e620e4c400de7d4185e78b4a06862e07ed20c6751230f72d29331f304bb2
Size: 157.25 kB