A flaw was found in the way BIND handled requests for TKEY DNS resource
records. A remote attacker could use this flaw to make named (functioning
as an authoritative DNS server or a DNS resolver) exit unexpectedly with
an assertion failure via a specially crafted DNS request packet.
(CVE-2015-5477)
After installing the update, the BIND daemon (named) will be restarted
automatically.
--