From $URL :
A vulnerability has been reported in ISC BIND, which can be exploited by malicious people to cause
a DoS (Denial of Service).
The vulnerability is caused due to an error within the DNS64 IPv6 transition mechanism when
handling certain queries, which can be exploited to trigger a REQUIRE assertion and crash the
server via a specially crafted DNS query.
Successful exploitation requires that DNS64 is turned on.
The vulnerability is reported in versions 9.8.0 through 9.8.4 and 9.9.0 through 9.9.2.
Update to version 9.8.4-P1 or 9.9.2-P1.
net-dns/bind-9.9.2_p1 is in the tree. Feel free to stabilize it.
ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is
enabled, allows remote attackers to cause a denial of service (assertion
failure and daemon exit) via a crafted query.
(In reply to comment #1)
> net-dns/bind-9.9.2_p1 is in the tree. Feel free to stabilize it.
Arches, please test and mark stable.
Target KEYWORDS: "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
*** Bug 445924 has been marked as a duplicate of this bug. ***
Stable for HPPA.
GLSA vote: yes.
Thanks, folks. GLSA Vote: yes, too. Added to existing GLSA request.
This issue was resolved and addressed in
GLSA 201401-34 at http://security.gentoo.org/glsa/glsa-201401-34.xml
by GLSA coordinator Sean Amoss (ackle).