Software 44228 Published by

Internet Systems Consortium has pushed out three BIND 9 releases to patch four specific security vulnerabilities that could compromise DNS servers. Administrators must prioritize updating their stable branches to version 9.18.47 before attackers exploit the known CVEs listed in the advisory. Always verify cryptographic signatures on the downloaded tarballs to ensure the source files have not been corrupted or tampered with during transit. Skipping this maintenance cycle leaves critical infrastructure exposed and risks unnecessary downtime when a breach eventually occurs.



BIND 9 Updates Released With Critical Security Fixes For DNS Servers

The Internet Systems Consortium has pushed out new BIND 9 updates to address known vulnerabilities affecting the domain name system stack. Administrators running DNS servers should prioritize these releases to prevent potential exploitation attempts on their infrastructure before attackers do. This article outlines which branches are affected and where to find the necessary download packages for immediate installation without unnecessary delays.

Screenshot_from_2026_02_18_17_29_38

What is in the latest BIND 9 updates?

The March 2026 maintenance releases include fixes for four specific security vulnerabilities tracked as CVE-2026-1519, CVE-2026-3104, CVE-2026-3119 and CVE-2026-3591. Ignoring these patches leaves open doors that automated scanners can exploit to gain unauthorized access or disrupt name resolution services for clients relying on the server. The ISC maintains three distinct release streams for different needs within the community rather than forcing a single path on everyone. Users on stable platforms should target version 9.18.47 while those testing bleeding edge features might look at 9.20.21 instead to see newer capabilities. There is also an experimental development branch labeled as 9.21.20 available for those willing to accept instability in exchange for new functionality that may not be production ready yet. Every release directory contains a complete source tarball along with cryptographic signatures that verify the integrity of the files before installation begins and ensures no tampering occurred during transit.

How to apply the BIND 9 security patches safely

Upgrading DNS software requires careful planning because downtime during resolution can break client connectivity across an entire network without warning. Administrators should review the release notes for each version before attempting any upgrade procedure to understand what configuration changes might be required by the new code. The supported platforms list exists in the ARM documentation and a separate knowledgebase article that details which operating systems remain compatible with these builds on various hardware architectures. Downloading from the official ISC software download page ensures that the binaries match the intended architecture rather than pulling from third party repositories where tampering could occur during distribution. Running a test environment before pushing changes to production is always the prudent path for critical infrastructure components like name servers since rollback procedures are difficult once resolution fails.

Downloads

9.18.47 -   https://downloads.isc.org/isc/bind9/9.18.47/9.20.21 -   https://downloads.isc.org/isc/bind9/9.20.21/
9.21.20 -   https://downloads.isc.org/isc/bind9/9.21.20/