BIND 9.18.41, 9.20.15, and 9.21.14 released

Published by

ISC has announced the release of BIND versions 9.18.41, 9.20.15, and 9.21.14, which incorporate crucial updates aimed at addressing security vulnerabilities and enhancing performance. The updates specifically target three high-severity vulnerabilities:

1. CVE-2025-8677 - This flaw relates to the improper handling of DNSKEY records, which can lead to resource exhaustion. Malformed DNSKEY data can overwhelm the server's CPU, resulting in significant performance issues and denial of service for legitimate users.

2. CVE-2025-40778 - This vulnerability affects resolvers by allowing attackers to inject counterfeit data into the cache. Under certain conditions, BIND's leniency in accepting records can be exploited, potentially causing resolution problems for future queries if malicious records are cached.

3. CVE-2025-40780 - This issue is linked to a weakness in the Pseudo Random Number Generator (PRNG), enabling attackers to predict the source port and query ID. If attackers can do this, they may trick BIND into caching their malicious responses, leading to cache poisoning.

The release underscores the critical nature of keeping software updated to mitigate severe security threats and maintain dependable DNS services. Users are strongly encouraged to implement these updates to protect their systems from potential exploitation and ensure optimal functionality.

As an extension, it is vital for organizations relying on BIND to adopt comprehensive patch management practices. Regularly monitoring for updates, understanding the implications of identified vulnerabilities, and conducting thorough testing of new releases in a controlled environment can further enhance security posture. Additionally, organizations should consider implementing best practices such as network segmentation, using firewalls, and employing intrusion detection systems to minimize the risk of attacks that exploit such vulnerabilities. Proactive measures, alongside timely updates, will help ensure a more resilient and secure DNS infrastructure

BIND 9.18.41, 9.20.15, and 9.21.14 released

ISC has released BIND 9.18.41, 9.20.15, and 9.21.14 with significant updates addressing security vulnerabilities and improving performance. The updates include important fixes for three serious problems: CVE-2025-8677, which is a flaw that can cause the system to run out of resources because of incorrect handling of DNSKEY; CVE-2025-40778, which is a problem that lets attackers put fake data into the cache; and CVE-202 If left unpatched, these vulnerabilities could lead to significant performance degradation, denial-of-service for legitimate clients, and potential resolution issues for future queries.

BIND 9.18.41, 9.20.15, and 9.21.14 released @ Linux Compatible