A small number of users upgrading their Domain Name System (DNS) servers to guard against a major exploit in BIND have become entangled in a denial of service issue. The problem in updating from BIND (Berkeley Internet Name Domain) 4.9.x or . . .
A small number of users upgrading their Domain Name System (DNS) servers to guard against a major exploit in BIND have become entangled in a denial of service issue. The problem in updating from BIND (Berkeley Internet Name Domain) 4.9.x or 8.2.x to 9.1.0 is more a case of getting your hair singed than of jumping from the frying pan into the fire . This is because the DoS problem, though irritating, is much less serious than the earlier flaw.

On updating to BIND 9.1.0, some BSD users have become experienced intermittent failures when running nmap.

The link for this article located at TheRegister is no longer available.