> -----Original Message----- > From: centos-bounces at centos.org > [mailto:centos-bounces at centos.org] On Behalf Of Larry Vaden > Sent: Wednesday, February 23, 2011 12:27 PM > To: CentOS mailing list > Subject: > [CentOS]http://www.securityweek.com/high-severity-bind-vulnera > bility-advisory-issued > > US-CERT encourages users and administrators using the affected > versions of BIND to upgrade to BIND 9.7.3. > > Optionally, one can wait on a backport. Optionally, start BIND with the parameter to restrict BIND to one thread (-n 1). This prevents the deadlock which, though fatal to BIND when it happens, is a remote probability. ******************************************************************* This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This footnote also confirms that this email message has been swept for the presence of computer viruses. www.Hubbell.com - Hubbell Incorporated**