- Issued:
- 2004-12-21
- Updated:
- 2004-12-21
RHBA-2004:568 - Bug Fix Advisory
Synopsis
Updated caching-nameserver package
Type/Severity
Bug Fix Advisory
Topic
An updated caching-nameserver package that fixes several bugs is now available.
Description
The caching-nameserver package includes the configuration files that
will make BIND, the DNS name server, act as a simple caching
nameserver. Many users on dial-up connections use this package along
with BIND for this purpose.
This updated package addresses the following issues:
- Support for all RFC1912 pseudo-TLDs
(0.in-addr.arpa, 255.in-addr.arpa) and the default TLDs :
( localdomain. and \[x0/124].ip6.arpa )
as well as the localhost. TLD
- Correct and safe interoperability with the bind-chroot package
All users of caching-nameserver should upgrade to this updated package,
which resolves these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 3 x86_64
- Red Hat Enterprise Linux Server 3 ia64
- Red Hat Enterprise Linux Server 3 i386
- Red Hat Enterprise Linux for IBM z Systems 3 s390x
- Red Hat Enterprise Linux for IBM z Systems 3 s390
- Red Hat Enterprise Linux for Power, big endian 3 ppc
Fixes
- BZ - 84932 - BIND - Caching Nameserver RFC1912 Section 4.1
- BZ - 105593 - bind-chroot is missing essential zone files
- BZ - 107698 - error installing caching-nameserver
- BZ - 124992 - caching-nameserver doesn't work out of the box
- BZ - 128942 - Broken files in the named chroot environment
- BZ - 131021 - caching-nameserver creates broken links and lots of .rpmsave files on upgrade
CVEs
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.