[CentOS] http://www.securityweek.com/high-severity-bind-vulnerability-advisory-issued

Wed Feb 23 17:45:59 UTC 2011
Brunner, Brian T. <BBrunner at gai-tronics.com>

> -----Original Message-----
> From: centos-bounces at centos.org 
> [mailto:centos-bounces at centos.org] On Behalf Of Larry Vaden
> Sent: Wednesday, February 23, 2011 12:27 PM
> To: CentOS mailing list
> Subject: 
> [CentOS]http://www.securityweek.com/high-severity-bind-vulnera
> bility-advisory-issued
> US-CERT encourages users and administrators using the affected
> versions of BIND to upgrade to BIND 9.7.3.
> Optionally, one can wait on a backport.

Optionally, start BIND with the parameter to restrict BIND to one thread
(-n 1).
This prevents the deadlock which, though fatal to BIND when it happens,
is a remote probability.
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom
they are addressed. If you have received this email in error please
notify the system manager. This footnote also confirms that this
email message has been swept for the presence of computer viruses.
www.Hubbell.com - Hubbell Incorporated**