Skip to navigation

Bug Fix Advisory system-config-bind bug fix update

Advisory: RHBA-2011:1505-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

An updated system-config-bind package that fixes various bugs is now available
for Red Hat Enterprise Linux 5.

The system-config-bind package provides a graphical user interface (GUI) to
configure the Berkeley Internet Name Domain (BIND) Domain Name System (DNS)
server.

This updated system-config-bind package includes fixes for the following bugs:

* Prior to this update the system-config-bind utility no longer parsed include
statements within a view clause. Consequently zones in a config file referenced
by an include statement within a view clause were not shown. With this update
include statements are correctly parsed and zones referenced in this way are
once again shown. (BZ#511864)

* When configuring a name server (NS) record for a domain, if an invalid name
was given in the Server Domain Name field a modal dialog box would display, "Bad
DNS Name:", and clicking "OK" did not allow a valid name to be entered.
Consequently it was not possible to correct the mistake. With this update the
dialog box now correctly responds to clicking "OK" and a correct Server Domain
Name can be entered. (BZ#462846)

All users of system-config-bind are advised to upgrade to this updated package,
which fixes these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
system-config-bind-4.0.3-5.el5.src.rpm
File outdated by:  RHBA-2013:0037
    MD5: 33f18ca3ecfd2ba5cec1a1a0eda3b2f0
SHA-256: 7d30b2d92c9d7665ffba5db5ce4235531667b325173f4c0f40558ae3e451ca4e
 
IA-32:
system-config-bind-4.0.3-5.el5.noarch.rpm
File outdated by:  RHBA-2013:0037
    MD5: 620715c18a91f754fab24429b3fb85cb
SHA-256: 83bdca9ca3b04ea2db79d23a8bfbccaa0f05169ce9a498cc6d5688720c96b31a
 
x86_64:
system-config-bind-4.0.3-5.el5.noarch.rpm
File outdated by:  RHBA-2013:0037
    MD5: 620715c18a91f754fab24429b3fb85cb
SHA-256: 83bdca9ca3b04ea2db79d23a8bfbccaa0f05169ce9a498cc6d5688720c96b31a
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
system-config-bind-4.0.3-5.el5.src.rpm
File outdated by:  RHBA-2013:0037
    MD5: 33f18ca3ecfd2ba5cec1a1a0eda3b2f0
SHA-256: 7d30b2d92c9d7665ffba5db5ce4235531667b325173f4c0f40558ae3e451ca4e
 
IA-32:
system-config-bind-4.0.3-5.el5.noarch.rpm
File outdated by:  RHBA-2013:0037
    MD5: 620715c18a91f754fab24429b3fb85cb
SHA-256: 83bdca9ca3b04ea2db79d23a8bfbccaa0f05169ce9a498cc6d5688720c96b31a
 
IA-64:
system-config-bind-4.0.3-5.el5.noarch.rpm
File outdated by:  RHBA-2013:0037
    MD5: 620715c18a91f754fab24429b3fb85cb
SHA-256: 83bdca9ca3b04ea2db79d23a8bfbccaa0f05169ce9a498cc6d5688720c96b31a
 
PPC:
system-config-bind-4.0.3-5.el5.noarch.rpm
File outdated by:  RHBA-2013:0037
    MD5: 620715c18a91f754fab24429b3fb85cb
SHA-256: 83bdca9ca3b04ea2db79d23a8bfbccaa0f05169ce9a498cc6d5688720c96b31a
 
s390x:
system-config-bind-4.0.3-5.el5.noarch.rpm
File outdated by:  RHBA-2013:0037
    MD5: 620715c18a91f754fab24429b3fb85cb
SHA-256: 83bdca9ca3b04ea2db79d23a8bfbccaa0f05169ce9a498cc6d5688720c96b31a
 
x86_64:
system-config-bind-4.0.3-5.el5.noarch.rpm
File outdated by:  RHBA-2013:0037
    MD5: 620715c18a91f754fab24429b3fb85cb
SHA-256: 83bdca9ca3b04ea2db79d23a8bfbccaa0f05169ce9a498cc6d5688720c96b31a
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

462846 - system-config-bind/ modal dialog refuses to die
511864 - system-config-bind no longer parses include statements within view clause



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/