In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9-dbgsym" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9-dnsutils" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9-dnsutils-dbgsym" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9-doc" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9-host" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9-host-dbgsym" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9-libs" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9-libs-dbgsym" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9-utils" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9-utils-dbgsym" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "bind9utils" }, { "binary_version": "1:9.16.1-0ubuntu2.3", "binary_name": "dnsutils" } ] }