Has anyone assesed the impact of the bind exploit announced by CERT today.
I'm using bind_4.9.6-1.deb, so would be curious as to where I stood, what the fixes were. Thanks Henry Hollenberg [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]