[CentOS] RECALL: http://www.securityweek.com/high-severity-bind-vulnerability-advisory-issued

Wed Feb 23 21:02:28 UTC 2011
Markus Falb <markus.falb at fasel.at>

On 23.2.2011 21:47, Larry Vaden wrote:
> On Wed, Feb 23, 2011 at 11:27 AM, Larry Vaden <vaden-frDgtZTyRT6sTnJN9+BGXg at public.gmane.org> wrote:
>> US-CERT encourages users and administrators using the affected
>> versions of BIND to upgrade to BIND 9.7.3.
>>
>> Optionally, one can wait on a backport.
> 
> This message is RECALLED even though:
> 
> 1) US-CERT used the word "affected."
> 2) the "optionally" was directed to those who might have used
> RHEL/CentOS' excellent facility to draw in code from other repos.

You dont got it ? Another try: There will be no backport, because bind
in RHEL/CentOS is not affected. But yes, optionally one can wait...

-- 
Best Regards, Markus Falb, waiting...

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 267 bytes
Desc: OpenPGP digital signature
URL: <http://lists.centos.org/pipermail/centos/attachments/20110223/6da0938d/attachment-0004.sig>