[ 00:22:52 dougb ] bind9dns Completely new version of the BIND DNS suite with updated DNSSEC
Apply the patch derived from version 9.6.1-P1 which addresses a remote
Receipt of a specially-crafted dynamic update message may
cause BIND 9 servers to exit. This vulnerability affects all
servers -- it is not limited to those that are configured to
allow dynamic updates. Access controls will not provide an
More details can be found here: https://www.isc.org/node/474
All BIND users are encouraged to update to a patched version ASAP.