An attacker controlling a malicious nameserver could respond with two responses in quick succession, each with a "CLIENT-SUBNET" pseudo-option and where the first is broken. Processing the second response after the first causes named to terminate.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-3488