named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
{
"binaries": [
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "bind9"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "bind9-host"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "bind9utils"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "dnsutils"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "host"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "libbind-dev"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "libbind9-90"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "libdns100"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "libisc95"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "libisccc90"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "libisccfg90"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "liblwres90"
},
{
"binary_version": "1:9.9.5.dfsg-3ubuntu0.2",
"binary_name": "lwresd"
}
],
"availability": "No subscription required"
}