Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»BIND Updates Patch High-Severity Vulnerabilities
    Cybersecurity

    BIND Updates Patch High-Severity Vulnerabilities

    adminBy adminMarch 26, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    DNS Vulnerabilities
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Internet Systems Consortium (ISC) on Wednesday rolled out a fresh round of BIND 9 updates to resolve four vulnerabilities, including two high-severity bugs.

    Tracked as CVE-2026-3104, the first high-severity flaw is described as a memory leak issue impacting code preparing DNSSEC proofs of non-existence.

    The security defect can be exploited via crafted domains to cause a memory leak in BIND resolvers. Authoritative servers may not be impacted, ISC notes in its advisory.

    “If a BIND resolver is asked to query a specially crafted domain, memory will not be recovered by named. This can cause unbounded growth of Resident Set Size (RSS) memory, which may lead to an out-of-memory condition. Additionally, named will exit with an assertion failure if a shutdown or reload is attempted,” ISC explains.

    The second high-severity vulnerability patched in the DNS software suite is CVE-2026-1519, which can lead to high CPU consumption when the resolver encounters a maliciously crafted zone during DNSSEC validation. This could lead to a sharp decrease in the number of handled queries.

    While not recommended, disabling DNSSEC prevents the exploitation of this vulnerability, ISC notes.

    Advertisement. Scroll to continue reading.

    Exploitation of both CVE-2026-3104 and CVE-2026-1519 can lead to denial of service (DoS), according to an advisory from Ubuntu, which provides BIND packages to its users. 

    The first medium-severity flaw addressed in the latest BIND releases is CVE-2026-3119, which could lead to unexpected named termination during the processing of a query containing a TKEY record.

    The second is CVE-2026-3591, a use-after-return flaw in SIG(0) handling code that could lead to ACL bypass. The issue can be exploited via specially crafted DNS requests.

    Patches for these security defects were included in BIND versions 9.18.47, 9.20.21, and 9.21.20, and in BIND Supported Preview Edition versions 9.18.47-S1 and 9.20.21-S1.

    ISC says it is not aware of any of these vulnerabilities being exploited in the wild. Additional information can be found on its software updates page.

    Related: Cisco Patches Multiple Vulnerabilities in IOS Software

    Related: iOS, macOS 26.4 Roll Out With Fresh Security Patches

    Related: Chrome 146 Update Patches High-Severity Vulnerabilities

    Related: QNAP Patches Four Vulnerabilities Exploited at Pwn2Own

    BIND HighSeverity Patch Updates Vulnerabilities
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article86% say AI boosts productivity, while nearly half of major firms still operate without clear risk frameworks in place
    Next Article Don’t miss this! These earbuds beat the AirPods Pro 3 for me, and they’re now $50 off
    admin
    • Website

    Related Posts

    Cursor AI Vulnerability Exposed Developer Devices

    April 17, 2026

    Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

    April 17, 2026

    NIST limits vulnerability analysis as CVE backlog swells

    April 17, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Cursor AI Vulnerability Exposed Developer Devices

    April 17, 2026

    Tux Manager is the perfect Linux Task Manager replacement for Windows refugees

    April 17, 2026

    Your AI Visibility Strategy Doesn’t Work Outside English

    April 17, 2026

    Anker’s ultra-compact 45W charger with a screen drops to its best price ever

    April 17, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,359)
    • Privacy & Online Earning (170)
    • SEO & Digital Marketing (834)
    • Tech Tools & Mobile / Apps (1,625)
    • WiFi / Internet & Networking (227)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Cursor AI Vulnerability Exposed Developer Devices

    April 17, 2026

    Tux Manager is the perfect Linux Task Manager replacement for Windows refugees

    April 17, 2026

    Your AI Visibility Strategy Doesn’t Work Outside English

    April 17, 2026
    Most Popular
    • Cursor AI Vulnerability Exposed Developer Devices
    • Tux Manager is the perfect Linux Task Manager replacement for Windows refugees
    • Your AI Visibility Strategy Doesn’t Work Outside English
    • Anker’s ultra-compact 45W charger with a screen drops to its best price ever
    • Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
    • Mysterious ‘Pixel Glow’ notification tool may involve new hardware
    • NIST limits vulnerability analysis as CVE backlog swells
    • Google AI Mode in Chrome now lets you search deeper with fewer tabs
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.