ArchLinux: 201507-22: bind: denial of service
Summary
A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet leading to denial of service.
Resolution
Upgrade to 9.10.2.P3-1.
# pacman -Syu "bind>=9.10.2.P3-1"
The problem has been fixed upstream in version 9.10.2.P3.
References
https://access.redhat.com/security/cve/CVE-2015-5477
Workaround
None.