In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "bind9", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "bind9-dbgsym", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "bind9-dnsutils", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "bind9-dnsutils-dbgsym", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "bind9-doc", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "bind9-host", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "bind9-host-dbgsym", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "bind9-libs", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "bind9-libs-dbgsym", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "bind9-utils", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "bind9-utils-dbgsym", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "bind9utils", "binary_version": "1:9.16.1-0ubuntu2.3" }, { "binary_name": "dnsutils", "binary_version": "1:9.16.1-0ubuntu2.3" } ] }