Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-19793

Опубликовано: 05 нояб. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-19793: bind9.16 security update (IMPORTANT)

[32:9.16.23-0.22.4]

  • Prevent cache poisoning due to weak PRNG (CVE-2025-40780)
  • Address various spoofing attacks (CVE-2025-40778)
  • Replace downstream fixes with upstream changes

[32:9.16.23-0.22.3]

  • Update addresses of b.root-servers.net (RHEL-18449)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

bind9.16

9.16.23-0.22.el8_10.4

bind9.16-chroot

9.16.23-0.22.el8_10.4

bind9.16-devel

9.16.23-0.22.el8_10.4

bind9.16-dnssec-utils

9.16.23-0.22.el8_10.4

bind9.16-doc

9.16.23-0.22.el8_10.4

bind9.16-libs

9.16.23-0.22.el8_10.4

bind9.16-license

9.16.23-0.22.el8_10.4

bind9.16-utils

9.16.23-0.22.el8_10.4

python3-bind9.16

9.16.23-0.22.el8_10.4

Oracle Linux x86_64

bind9.16

9.16.23-0.22.el8_10.4

bind9.16-chroot

9.16.23-0.22.el8_10.4

bind9.16-devel

9.16.23-0.22.el8_10.4

bind9.16-dnssec-utils

9.16.23-0.22.el8_10.4

bind9.16-doc

9.16.23-0.22.el8_10.4

bind9.16-libs

9.16.23-0.22.el8_10.4

bind9.16-license

9.16.23-0.22.el8_10.4

bind9.16-utils

9.16.23-0.22.el8_10.4

python3-bind9.16

9.16.23-0.22.el8_10.4

Связанные CVE

Связанные уязвимости

suse-cvrf
10 дней назад

Security update for bind

oracle-oval
4 дня назад

ELSA-2025-19912: bind security update (IMPORTANT)

CVSS3: 8.6
ubuntu
19 дней назад

In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

CVSS3: 8.6
nvd
19 дней назад

In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

msrc
16 дней назад

Cache poisoning due to weak PRNG