Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2011:0223 - Bug Fix Advisory
Issued:
2011-02-16
Updated:
2011-02-16

RHBA-2011:0223 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

bind bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated bind packages that fix various bugs are now available for Red Hat
Enterprise Linux 4.

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name
System (DNS) protocols. BIND includes a DNS server (named), a resolver library
(routines for applications to use when interfacing with DNS), and tools for
verifying that the DNS server is operating correctly.

This update fixes the following bugs:

  • The named init script did not wait for proper named termination before

attempting to restart named, which, when the name server was under moderate or
high load, could cause a failure to start. With this update, the named init
script waits for named termination before attempting to restart the name server.
(BZ#455540)

  • Under heavy load, the named daemon could fail to respond to a TCP query. If

recursive queries consumed all available UDP sockets, then the opening of a TCP
socket could have failed due to a default limit placed upon the number of open
file descriptors. This default limit has been removed entirely from these
updated packages, which both prevents the possibility of named failing to
respond to a TCP query, and corresponds to the existing documentation.
(BZ#456417)

  • Under certain conditions, the named daemon could exit due to an assertion

failure. When this happened, the following message was logged to
/var/log/messages:

named: socket.c:1649: INSIST(!sock->pending_recv) failed named: exiting (due
to assertion failure)

This update provides a fix to the socket module which prevents this assertion
from failing, thus resolving the problem. (BZ#462060)

  • The rndc command line utility allows the named daemon to be administered

locally or remotely. Previously, named exited due to an assertion failure when
it received a command via rdnc telling it to reload a subdomain of its
authoritative domain. With this update, when named receives such a command via
rdnc, it logs an error message to the system log and ignores the command.
(BZ#475202)

  • When the number of processed queries in BIND was sufficiently high, the

following error message was logged:

internal_accept: fcntl() failed: Too many open files

With this update, timeout queries are aborted in order to reduce the number of
open UDP sockets, and when the accept() function returns an "EMFILE" error
value, that situation is now handled gracefully, thus resolving the issue.
(BZ#476515)

  • BIND redundantly bound random UDP ports which might have been used by another

application with the "SO_REUSEADDR" option. As a result of this, the application
which used that port was terminated abnormally. With this update, BIND no longer
bounds random ports with the "SO_REUSEADDR" option. (BZ#480819)

  • When running on a system receiving a large number (greater than 4,000) of DNS

requests per second, the named DNS nameserver became unresponsive, and the named
service had to be restarted in order for it to continue serving requests. This
was caused by a deadlock occurring between two threads that led to the inability
of named to continue to service requests. This deadlock has been resolved with
these updated packages so that named no longer becomes unresponsive under heavy
load. (BZ#509975)

  • When named received an IPv4-mapped request on an IPv6 interface, an error in

named caused it to stop responding with the following log message:

client.c:1334: unexpected error: failed to get request's destination: failure

This error has been corrected and named no longer freezes and no longer accepts
IPv4-mapped requests on IPv6 interfaces. (BZ#518866)

  • Previously, the host command incorrectly returned the status code "0" even

when the nameserver did not respond. With this update, the host command returns
the correct status code for this situation, which is "1". (BZ#559524)

All users of BIND are advised to upgrade to these updated packages, which
resolve these issues.

Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 455540 - named init script doesn't wait for server terminaton
  • BZ - 462060 - named service crashes with an assertion failed message
  • BZ - 475202 - named crashes on incorrect usage of rndc reload command
  • BZ - 476515 - RHEL4: bind-9.2.4-30.el4 and too many open files
  • BZ - 518866 - named stops responding after an unexpected error in client.c
  • BZ - 559524 - host should return non-zero status in case of error

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
bind-9.2.4-37.el4.src.rpm SHA-256: b12775a7f4e32cd79fcf88112ae0ed89dad423411e037b51192b199cd6539296
x86_64
bind-9.2.4-37.el4.x86_64.rpm SHA-256: 096bad7c0da2a2888f22590ae1a71667ea8045f8ca71dd926a8a5165329f8aaf
bind-9.2.4-37.el4.x86_64.rpm SHA-256: 096bad7c0da2a2888f22590ae1a71667ea8045f8ca71dd926a8a5165329f8aaf
bind-chroot-9.2.4-37.el4.x86_64.rpm SHA-256: 8b9b94b43e1fe14b642c87e9f9b450ff3404508072a2eaaaefc6386b175af3eb
bind-chroot-9.2.4-37.el4.x86_64.rpm SHA-256: 8b9b94b43e1fe14b642c87e9f9b450ff3404508072a2eaaaefc6386b175af3eb
bind-devel-9.2.4-37.el4.x86_64.rpm SHA-256: 5736e70e1491a39a6510d25a1c7b60ed35aa3bd39b417877c87c8092893ea6e0
bind-devel-9.2.4-37.el4.x86_64.rpm SHA-256: 5736e70e1491a39a6510d25a1c7b60ed35aa3bd39b417877c87c8092893ea6e0
bind-libs-9.2.4-37.el4.i386.rpm SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.i386.rpm SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.x86_64.rpm SHA-256: 516d65fc5753634741fab00afd4914263789a158903279fe9f402d7110d7c5b7
bind-libs-9.2.4-37.el4.x86_64.rpm SHA-256: 516d65fc5753634741fab00afd4914263789a158903279fe9f402d7110d7c5b7
bind-utils-9.2.4-37.el4.x86_64.rpm SHA-256: 19ed61d3cefec8ede7fd0ea6bef4149b12089eba783cdd57e32c0796d727fa84
bind-utils-9.2.4-37.el4.x86_64.rpm SHA-256: 19ed61d3cefec8ede7fd0ea6bef4149b12089eba783cdd57e32c0796d727fa84
ia64
bind-9.2.4-37.el4.ia64.rpm SHA-256: ec03f93f1b1af70e19bfc38824d004d1ac6e2542fccd9a1d8fc6cc5079f33a24
bind-9.2.4-37.el4.ia64.rpm SHA-256: ec03f93f1b1af70e19bfc38824d004d1ac6e2542fccd9a1d8fc6cc5079f33a24
bind-chroot-9.2.4-37.el4.ia64.rpm SHA-256: 7f17a76aedc80b6e643df056c6bb7162da7dd21842dcbc61ecdf11bcfc2a5bfc
bind-chroot-9.2.4-37.el4.ia64.rpm SHA-256: 7f17a76aedc80b6e643df056c6bb7162da7dd21842dcbc61ecdf11bcfc2a5bfc
bind-devel-9.2.4-37.el4.ia64.rpm SHA-256: 8a46167eeaa73fa2716bd103b8d7ecb0cc8aa7f0cae77a047c9db2a7c12d0108
bind-devel-9.2.4-37.el4.ia64.rpm SHA-256: 8a46167eeaa73fa2716bd103b8d7ecb0cc8aa7f0cae77a047c9db2a7c12d0108
bind-libs-9.2.4-37.el4.i386.rpm SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.i386.rpm SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.ia64.rpm SHA-256: 3f3ba9ad055ca331f2cef557c3498c43e98595247fdd2443f007ba99acca1379
bind-libs-9.2.4-37.el4.ia64.rpm SHA-256: 3f3ba9ad055ca331f2cef557c3498c43e98595247fdd2443f007ba99acca1379
bind-utils-9.2.4-37.el4.ia64.rpm SHA-256: 786db26e1ab75829acaee8827e3dcdfd37f57d3cad5b8d0117ff91a2457686fb
bind-utils-9.2.4-37.el4.ia64.rpm SHA-256: 786db26e1ab75829acaee8827e3dcdfd37f57d3cad5b8d0117ff91a2457686fb
i386
bind-9.2.4-37.el4.i386.rpm SHA-256: 24f817812133807f63d1d1368abd81b6c6f6b512c1c1e76924a5aee3ea36abe6
bind-9.2.4-37.el4.i386.rpm SHA-256: 24f817812133807f63d1d1368abd81b6c6f6b512c1c1e76924a5aee3ea36abe6
bind-chroot-9.2.4-37.el4.i386.rpm SHA-256: ae6e31df4524202af8a22e0fb2b69d0cc2c61d884be8075b9a1c5ae668824883
bind-chroot-9.2.4-37.el4.i386.rpm SHA-256: ae6e31df4524202af8a22e0fb2b69d0cc2c61d884be8075b9a1c5ae668824883
bind-devel-9.2.4-37.el4.i386.rpm SHA-256: ab70627cfa4be7423fb66c6a012bd6334d047c364189921f6045b6fc848bdc43
bind-devel-9.2.4-37.el4.i386.rpm SHA-256: ab70627cfa4be7423fb66c6a012bd6334d047c364189921f6045b6fc848bdc43
bind-libs-9.2.4-37.el4.i386.rpm SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.i386.rpm SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-utils-9.2.4-37.el4.i386.rpm SHA-256: 1a0c57910878fbaf87c8b476a8647b5921c6dd8c6e9d511dec6705af6a2f27f5
bind-utils-9.2.4-37.el4.i386.rpm SHA-256: 1a0c57910878fbaf87c8b476a8647b5921c6dd8c6e9d511dec6705af6a2f27f5

Red Hat Enterprise Linux Workstation 4

SRPM
bind-9.2.4-37.el4.src.rpm SHA-256: b12775a7f4e32cd79fcf88112ae0ed89dad423411e037b51192b199cd6539296
x86_64
bind-9.2.4-37.el4.x86_64.rpm SHA-256: 096bad7c0da2a2888f22590ae1a71667ea8045f8ca71dd926a8a5165329f8aaf
bind-chroot-9.2.4-37.el4.x86_64.rpm SHA-256: 8b9b94b43e1fe14b642c87e9f9b450ff3404508072a2eaaaefc6386b175af3eb
bind-devel-9.2.4-37.el4.x86_64.rpm SHA-256: 5736e70e1491a39a6510d25a1c7b60ed35aa3bd39b417877c87c8092893ea6e0
bind-libs-9.2.4-37.el4.i386.rpm SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.x86_64.rpm SHA-256: 516d65fc5753634741fab00afd4914263789a158903279fe9f402d7110d7c5b7
bind-utils-9.2.4-37.el4.x86_64.rpm SHA-256: 19ed61d3cefec8ede7fd0ea6bef4149b12089eba783cdd57e32c0796d727fa84
ia64
bind-9.2.4-37.el4.ia64.rpm SHA-256: ec03f93f1b1af70e19bfc38824d004d1ac6e2542fccd9a1d8fc6cc5079f33a24
bind-chroot-9.2.4-37.el4.ia64.rpm SHA-256: 7f17a76aedc80b6e643df056c6bb7162da7dd21842dcbc61ecdf11bcfc2a5bfc
bind-devel-9.2.4-37.el4.ia64.rpm SHA-256: 8a46167eeaa73fa2716bd103b8d7ecb0cc8aa7f0cae77a047c9db2a7c12d0108
bind-libs-9.2.4-37.el4.i386.rpm SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.ia64.rpm SHA-256: 3f3ba9ad055ca331f2cef557c3498c43e98595247fdd2443f007ba99acca1379
bind-utils-9.2.4-37.el4.ia64.rpm SHA-256: 786db26e1ab75829acaee8827e3dcdfd37f57d3cad5b8d0117ff91a2457686fb
i386
bind-9.2.4-37.el4.i386.rpm SHA-256: 24f817812133807f63d1d1368abd81b6c6f6b512c1c1e76924a5aee3ea36abe6
bind-chroot-9.2.4-37.el4.i386.rpm SHA-256: ae6e31df4524202af8a22e0fb2b69d0cc2c61d884be8075b9a1c5ae668824883
bind-devel-9.2.4-37.el4.i386.rpm SHA-256: ab70627cfa4be7423fb66c6a012bd6334d047c364189921f6045b6fc848bdc43
bind-libs-9.2.4-37.el4.i386.rpm SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-utils-9.2.4-37.el4.i386.rpm SHA-256: 1a0c57910878fbaf87c8b476a8647b5921c6dd8c6e9d511dec6705af6a2f27f5

Red Hat Enterprise Linux Desktop 4

SRPM
bind-9.2.4-37.el4.src.rpm SHA-256: b12775a7f4e32cd79fcf88112ae0ed89dad423411e037b51192b199cd6539296
x86_64
bind-9.2.4-37.el4.x86_64.rpm SHA-256: 096bad7c0da2a2888f22590ae1a71667ea8045f8ca71dd926a8a5165329f8aaf
bind-chroot-9.2.4-37.el4.x86_64.rpm SHA-256: 8b9b94b43e1fe14b642c87e9f9b450ff3404508072a2eaaaefc6386b175af3eb
bind-devel-9.2.4-37.el4.x86_64.rpm SHA-256: 5736e70e1491a39a6510d25a1c7b60ed35aa3bd39b417877c87c8092893ea6e0
bind-libs-9.2.4-37.el4.i386.rpm SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.x86_64.rpm SHA-256: 516d65fc5753634741fab00afd4914263789a158903279fe9f402d7110d7c5b7
bind-utils-9.2.4-37.el4.x86_64.rpm SHA-256: 19ed61d3cefec8ede7fd0ea6bef4149b12089eba783cdd57e32c0796d727fa84
i386
bind-9.2.4-37.el4.i386.rpm SHA-256: 24f817812133807f63d1d1368abd81b6c6f6b512c1c1e76924a5aee3ea36abe6
bind-chroot-9.2.4-37.el4.i386.rpm SHA-256: ae6e31df4524202af8a22e0fb2b69d0cc2c61d884be8075b9a1c5ae668824883
bind-devel-9.2.4-37.el4.i386.rpm SHA-256: ab70627cfa4be7423fb66c6a012bd6334d047c364189921f6045b6fc848bdc43
bind-libs-9.2.4-37.el4.i386.rpm SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-utils-9.2.4-37.el4.i386.rpm SHA-256: 1a0c57910878fbaf87c8b476a8647b5921c6dd8c6e9d511dec6705af6a2f27f5

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
bind-9.2.4-37.el4.src.rpm SHA-256: b12775a7f4e32cd79fcf88112ae0ed89dad423411e037b51192b199cd6539296
s390x
bind-9.2.4-37.el4.s390x.rpm SHA-256: e64c0a08d94c25a4dedd5179cd057d10b52ed5ef63777381cf3e8510acf460a3
bind-chroot-9.2.4-37.el4.s390x.rpm SHA-256: beca30bfc9ef77eb856414598d572330c1f9d6f32d81624cd7291ba342199aa0
bind-devel-9.2.4-37.el4.s390x.rpm SHA-256: 54a240a6ac44b5c10f98a3cb37108565eb6ceb0da4498c69775cd2e342596512
bind-libs-9.2.4-37.el4.s390.rpm SHA-256: 3fae1fe84fa1d2629779cfa50080d4063d7b32065e1367e8ae654bf451b9d88f
bind-libs-9.2.4-37.el4.s390x.rpm SHA-256: 8fe6e6a4480f349b2d3cfe0f7f26af2293724e1112b3f74f3e69a8218301fc31
bind-utils-9.2.4-37.el4.s390x.rpm SHA-256: d5569c5682e8126fb96bc895007b627ae7be7e56565f90453234484bd2646beb
s390
bind-9.2.4-37.el4.s390.rpm SHA-256: 1df9bfa0c020345a4fde7a7009fd1697e565ccad8d9faabf9079a58176428db1
bind-chroot-9.2.4-37.el4.s390.rpm SHA-256: 01dbdb7891d2b806bca48ab5fcc9db0badf1f2b083d8001a37f3de0d63aaf6d2
bind-devel-9.2.4-37.el4.s390.rpm SHA-256: 7db9e5f8a2e831e019c6835942fe548b0ffc5de57b3b012fce6514db824d9d3d
bind-libs-9.2.4-37.el4.s390.rpm SHA-256: 3fae1fe84fa1d2629779cfa50080d4063d7b32065e1367e8ae654bf451b9d88f
bind-utils-9.2.4-37.el4.s390.rpm SHA-256: fb4d1b180aaef78f2416032eb44dc1563a68601fc41747828f727ad15c16099a

Red Hat Enterprise Linux for Power, big endian 4

SRPM
bind-9.2.4-37.el4.src.rpm SHA-256: b12775a7f4e32cd79fcf88112ae0ed89dad423411e037b51192b199cd6539296
ppc
bind-9.2.4-37.el4.ppc.rpm SHA-256: 04e82d03170b9bbca4f85bef76dc9edc6ebed8e62ceaf7a34ec02e1b108f8a23
bind-chroot-9.2.4-37.el4.ppc.rpm SHA-256: 0f0d7fa71c27a7726aea899936db4efe8bfd0c0f4606d532b15f86e82bc86730
bind-devel-9.2.4-37.el4.ppc.rpm SHA-256: f6a4d24b4b64fff384b98a443a27f69c70c87aa672490ca2e80021fea4da1090
bind-libs-9.2.4-37.el4.ppc.rpm SHA-256: d5b701b796824ad02e751fafc282a1b04edbc51e17b4aa42596fdefa3bd4f5ee
bind-libs-9.2.4-37.el4.ppc64.rpm SHA-256: 47a7ab93e5d03a33847a05a9e5bd0ee023f71b1b4a92be8d063104d924f3b4d3
bind-utils-9.2.4-37.el4.ppc.rpm SHA-256: 69fa4717dc8d2c693fd3536ce32e8f7a232a21c2f426c6b1226be5518e4e5159

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility