When Response Policy Zones (RPZ) RRset replacement is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RRSIG query. "In BIND 9.8.0, when an RPZ was configured to replace the answer RRset for a given name, a query of type RRSIG for that name could trigger an assertion failure and cause the name server process to exit." Affected versions: net-dns/bind-9.8.0 Fixed in: net-dns/bind-9.8.0_p1
~arch only, closing noglsa. no vulnerable ebuilds left in the tree.