Has anyone assesed the impact of the bind exploit announced by CERT today.

I'm using bind_4.9.6-1.deb, so would be curious as to where I stood, what
the fixes were.

Thanks

        Henry Hollenberg     [EMAIL PROTECTED] 



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to