Prepare for more frequent BIND security updates
Plan for more frequent BIND security updates, at least for the remainder of 2026.
Read postLarge language models (LLMs) are making it much easier to find software vulnerabilities in open source, lowering the bar for researchers and bad actors alike, and causing a temporary flood of vulnerability reports to us, and to many open source projects. We are currently triaging vulnerability reports, both from external reporters and our own LLM analysis, at a rate that exceeds 10X the historic levels.
To manage the avalanche of reports, we are making a few changes to the BIND release process and vulnerability handling. We plan to re-evaluate these changes at the end of 2026.
Users who are currently running 9.18 or 9.18-S should make plans to update to 9.20 as soon as possible, because we will be focusing our efforts on fixing vulnerabilities in the 9.20 and 9.21 branches.
BIND users should plan for frequent security updates for the rest of the year. Although we have had an informal practice of limiting ourselves to a single security release per quarter, to relieve the pressure on operators to update frequently, the situation now demands some changes.
We may also begin issuing CVEs for more medium-severity issues, such as those that score in the CVSS 5 - 7 range. Our policy is to issue Early Vulnerability Notices (EVNs) only for CVSS scores of 7 or higher, which is not changing. We may not always backport fixes for medium-severity CVEs, depending on the specific case. We welcome feedback on whether issuing CVEs for lower-severity problems would conflict with any of your internal policies.
These things, however, will not change:
We plan to reevaluate this situation in Q4 2026, and we hope that we will be able to return to our normal release cadence in Q1 2027.
We appreciate your understanding and flexibility as we work to keep BIND safe and reliable for our users.
What's New from ISC