BIND 9.18.47, 9.20.21, and 9.21.20 released

Published by

The Internet Systems Consortium has released three BIND 9 updates (versions 9.18.47, 9.20.21, and 9.21.20) to address four critical security vulnerabilities that could threaten DNS servers. Administrators are urged to update to version 9.18.47 to mitigate risks before attackers can exploit the identified vulnerabilities. Each release includes cryptographic signatures to ensure the integrity of the downloaded files, and users are advised to verify these signatures before installation. Proper planning and testing are essential for updates to avoid potential downtime and disruptions in network connectivity



BIND 9.18.47, 9.20.21, and 9.21.20 released

Internet Systems Consortium has pushed out three BIND 9 releases to patch four specific security vulnerabilities that could compromise DNS servers. Administrators must prioritize updating their stable branches to version 9.18.47 before attackers exploit the known CVEs listed in the advisory. Always verify cryptographic signatures on the downloaded tarballs to ensure the source files have not been corrupted or tampered with during transit. Skipping this maintenance cycle leaves critical infrastructure exposed and risks unnecessary downtime when a breach eventually occurs.

BIND 9.18.47, 9.20.21, and 9.21.20 released @ Linux Compatible