> Please take off the blinders and realize there are lots of folks (some x% of a
> million or more) on this list who compile from current source in order to
> minimize their risks and are therefore the subject audience.
> 
> On the one hand, you have Paul Vixie and crew (authors of BIND) and
> US_CERT saying "US-CERT encourages users and administrators using the
> affected versions of BIND to upgrade to BIND 9.7.3."  On the other hand, you
> have "don't bother me with reality, I'm comfortable, am not affected and
> don't want to read messages to those who are affected."

I've only been subscribed here a week and this topic seems very heated, so 
sorry if this stirs the pot up again, but don't patches for these things get 
back-ported?  So even if you're running bind v9.5.1 on CentOS/upstream 4/5.x 
you'd still have security fixes like those in this article backported right?

And yeah I suppose rolling your own is always an option but in my experience 
it's to easy to get behind.  This seems more like a Slackware approach tho, 
nothing against Slack of course!

Josh
 

_______________________________________________
CentOS mailing list
[email protected]
http://lists.centos.org/mailman/listinfo/centos

Reply via email to