BIND 9 Releases 9.18.46, 9.20.20 and 9.21.19: Update Now to Fix Critical DNS Bugs and Enhance Server Security

Published by

The latest BIND 9 releases (9.18.46, 9.20.20, and 9.21.19) include critical security fixes, performance enhancements, and bug resolutions that have been affecting system administrators. A significant fix addresses a "segmentation fault" error in the delv utility caused by a use-after-free error, leading to improved stability in DNS operations. Additionally, the updates enhance logging of dnstap messages and introduce randomization in nameserver selection to mitigate resolution failures. To update, users should download the appropriate tarball from ISC's website, verify its signature, and follow installation instructions to ensure their servers are secure and reliable



BIND 9 Releases 9.18.46, 9.20.20 and 9.21.19: Update Now to Fix Critical DNS Bugs and Enhance Server Security

The latest BIND 9 releases include several security fixes, performance improvements, and bug squashes that have been causing issues for system administrators. One major fix addresses a "segmentation fault" error in the delv utility caused by a use-after-free error, which has been a problem for months. The new releases also improve how BIND logs dnstap messages and randomize nameserver selection to prevent resolution failures. To upgrade, download the latest tarball from ISC's website, verify its signature with gpg, and follow the installation instructions to ensure your server is up-to-date and secure.

BIND 9 Releases 9.18.46, 9.20.20 and 9.21.19: Update Now to Fix Critical DNS Bugs and Enhance Server Security @ Linux Compatible