named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
https://support.apple.com/HT205219
https://security.gentoo.org/glsa/201510-01
https://kc.mcafee.com/corporate/index?page=content&id=SB10116
https://kb.juniper.net/JSA10783
https://kb.isc.org/article/AA-01235
https://bugzilla.redhat.com/show_bug.cgi?id=1193820
http://www.ubuntu.com/usn/USN-2503-1
http://www.mandriva.com/security/advisories?name=MDVSA-2015:165
http://www.mandriva.com/security/advisories?name=MDVSA-2015:054
http://rhn.redhat.com/errata/RHSA-2015-0672.html
http://marc.info/?l=bugtraq&m=143740940810833&w=2
http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150905.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150904.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html