Re: RECALL: http://www.securityweek.com/high-severity-bind-vulnerability-advisory-issued

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 23.2.2011 21:47, Larry Vaden wrote:
> On Wed, Feb 23, 2011 at 11:27 AM, Larry Vaden <vaden-frDgtZTyRT6sTnJN9+BGXg@xxxxxxxxxxxxxxxx> wrote:
>> US-CERT encourages users and administrators using the affected
>> versions of BIND to upgrade to BIND 9.7.3.
>>
>> Optionally, one can wait on a backport.
> 
> This message is RECALLED even though:
> 
> 1) US-CERT used the word "affected."
> 2) the "optionally" was directed to those who might have used
> RHEL/CentOS' excellent facility to draw in code from other repos.

You dont got it ? Another try: There will be no backport, because bind
in RHEL/CentOS is not affected. But yes, optionally one can wait...

-- 
Best Regards, Markus Falb, waiting...

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux