Описание
ELSA-2025-19793: bind9.16 security update (IMPORTANT)
[32:9.16.23-0.22.4]
- Prevent cache poisoning due to weak PRNG (CVE-2025-40780)
- Address various spoofing attacks (CVE-2025-40778)
- Replace downstream fixes with upstream changes
[32:9.16.23-0.22.3]
- Update addresses of b.root-servers.net (RHEL-18449)
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
bind9.16
9.16.23-0.22.el8_10.4
bind9.16-chroot
9.16.23-0.22.el8_10.4
bind9.16-devel
9.16.23-0.22.el8_10.4
bind9.16-dnssec-utils
9.16.23-0.22.el8_10.4
bind9.16-doc
9.16.23-0.22.el8_10.4
bind9.16-libs
9.16.23-0.22.el8_10.4
bind9.16-license
9.16.23-0.22.el8_10.4
bind9.16-utils
9.16.23-0.22.el8_10.4
python3-bind9.16
9.16.23-0.22.el8_10.4
Oracle Linux x86_64
bind9.16
9.16.23-0.22.el8_10.4
bind9.16-chroot
9.16.23-0.22.el8_10.4
bind9.16-devel
9.16.23-0.22.el8_10.4
bind9.16-dnssec-utils
9.16.23-0.22.el8_10.4
bind9.16-doc
9.16.23-0.22.el8_10.4
bind9.16-libs
9.16.23-0.22.el8_10.4
bind9.16-license
9.16.23-0.22.el8_10.4
bind9.16-utils
9.16.23-0.22.el8_10.4
python3-bind9.16
9.16.23-0.22.el8_10.4
Связанные CVE
Связанные уязвимости
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.