Skip to navigation

Bug Fix Advisory bind bug fix update

Advisory: RHBA-2011:0223-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-02-16
Last updated on: 2011-02-16
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)

Details

Updated bind packages that fix various bugs are now available for Red Hat
Enterprise Linux 4.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name
System (DNS) protocols. BIND includes a DNS server (named), a resolver library
(routines for applications to use when interfacing with DNS), and tools for
verifying that the DNS server is operating correctly.

This update fixes the following bugs:

* The named init script did not wait for proper named termination before
attempting to restart named, which, when the name server was under moderate or
high load, could cause a failure to start. With this update, the named init
script waits for named termination before attempting to restart the name server.
(BZ#455540)

* Under heavy load, the named daemon could fail to respond to a TCP query. If
recursive queries consumed all available UDP sockets, then the opening of a TCP
socket could have failed due to a default limit placed upon the number of open
file descriptors. This default limit has been removed entirely from these
updated packages, which both prevents the possibility of named failing to
respond to a TCP query, and corresponds to the existing documentation.
(BZ#456417)

* Under certain conditions, the named daemon could exit due to an assertion
failure. When this happened, the following message was logged to
/var/log/messages:

named: socket.c:1649: INSIST(!sock->pending_recv) failed named: exiting (due
to assertion failure)

This update provides a fix to the socket module which prevents this assertion
from failing, thus resolving the problem. (BZ#462060)

* The rndc command line utility allows the named daemon to be administered
locally or remotely. Previously, named exited due to an assertion failure when
it received a command via rdnc telling it to reload a subdomain of its
authoritative domain. With this update, when named receives such a command via
rdnc, it logs an error message to the system log and ignores the command.
(BZ#475202)

* When the number of processed queries in BIND was sufficiently high, the
following error message was logged:

internal_accept: fcntl() failed: Too many open files

With this update, timeout queries are aborted in order to reduce the number of
open UDP sockets, and when the accept() function returns an "EMFILE" error
value, that situation is now handled gracefully, thus resolving the issue.
(BZ#476515)

* BIND redundantly bound random UDP ports which might have been used by another
application with the "SO_REUSEADDR" option. As a result of this, the application
which used that port was terminated abnormally. With this update, BIND no longer
bounds random ports with the "SO_REUSEADDR" option. (BZ#480819)

* When running on a system receiving a large number (greater than 4,000) of DNS
requests per second, the named DNS nameserver became unresponsive, and the named
service had to be restarted in order for it to continue serving requests. This
was caused by a deadlock occurring between two threads that led to the inability
of named to continue to service requests. This deadlock has been resolved with
these updated packages so that named no longer becomes unresponsive under heavy
load. (BZ#509975)

* When named received an IPv4-mapped request on an IPv6 interface, an error in
named caused it to stop responding with the following log message:

client.c:1334: unexpected error: failed to get request's destination: failure

This error has been corrected and named no longer freezes and no longer accepts
IPv4-mapped requests on IPv6 interfaces. (BZ#518866)

* Previously, the host command incorrectly returned the status code "0" even
when the nameserver did not respond. With this update, the host command returns
the correct status code for this situation, which is "1". (BZ#559524)

All users of BIND are advised to upgrade to these updated packages, which
resolve these issues.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
bind-9.2.4-37.el4.src.rpm
File outdated by:  RHSA-2011:1496
    MD5: 0337a340c2f47329877762c4840b908c
SHA-256: b12775a7f4e32cd79fcf88112ae0ed89dad423411e037b51192b199cd6539296
 
IA-32:
bind-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 6b783c3df6507ed76c7646db8e942f95
SHA-256: 24f817812133807f63d1d1368abd81b6c6f6b512c1c1e76924a5aee3ea36abe6
bind-chroot-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 73445f9d4804175268e5951a5d79268c
SHA-256: ae6e31df4524202af8a22e0fb2b69d0cc2c61d884be8075b9a1c5ae668824883
bind-devel-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: ec97eea7a0b841754f82513e95909956
SHA-256: ab70627cfa4be7423fb66c6a012bd6334d047c364189921f6045b6fc848bdc43
bind-libs-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 1d7520e0d48f789345260a53ed1d7742
SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-utils-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 5da699ce8aca8f499db2081685eb0012
SHA-256: 1a0c57910878fbaf87c8b476a8647b5921c6dd8c6e9d511dec6705af6a2f27f5
 
x86_64:
bind-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: b896ab5eaef5a64a6bce4fd51f8a2d6c
SHA-256: 096bad7c0da2a2888f22590ae1a71667ea8045f8ca71dd926a8a5165329f8aaf
bind-chroot-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 67ec7fc1c2412c1891361268e2c7caba
SHA-256: 8b9b94b43e1fe14b642c87e9f9b450ff3404508072a2eaaaefc6386b175af3eb
bind-devel-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 54b6db0e3ea17bc7aa9f5ad2d14f6179
SHA-256: 5736e70e1491a39a6510d25a1c7b60ed35aa3bd39b417877c87c8092893ea6e0
bind-libs-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 1d7520e0d48f789345260a53ed1d7742
SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 69dcd80da2592d0e29cfedb6914fce94
SHA-256: 516d65fc5753634741fab00afd4914263789a158903279fe9f402d7110d7c5b7
bind-utils-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 5471bc6a3edb77da28a6d8cd9241b034
SHA-256: 19ed61d3cefec8ede7fd0ea6bef4149b12089eba783cdd57e32c0796d727fa84
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
bind-9.2.4-37.el4.src.rpm
File outdated by:  RHSA-2011:1496
    MD5: 0337a340c2f47329877762c4840b908c
SHA-256: b12775a7f4e32cd79fcf88112ae0ed89dad423411e037b51192b199cd6539296
 
IA-32:
bind-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 6b783c3df6507ed76c7646db8e942f95
SHA-256: 24f817812133807f63d1d1368abd81b6c6f6b512c1c1e76924a5aee3ea36abe6
bind-chroot-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 73445f9d4804175268e5951a5d79268c
SHA-256: ae6e31df4524202af8a22e0fb2b69d0cc2c61d884be8075b9a1c5ae668824883
bind-devel-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: ec97eea7a0b841754f82513e95909956
SHA-256: ab70627cfa4be7423fb66c6a012bd6334d047c364189921f6045b6fc848bdc43
bind-libs-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 1d7520e0d48f789345260a53ed1d7742
SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-utils-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 5da699ce8aca8f499db2081685eb0012
SHA-256: 1a0c57910878fbaf87c8b476a8647b5921c6dd8c6e9d511dec6705af6a2f27f5
 
IA-64:
bind-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: f9fd8975693c65df01724aea4c82fde5
SHA-256: ec03f93f1b1af70e19bfc38824d004d1ac6e2542fccd9a1d8fc6cc5079f33a24
bind-chroot-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: c175f1e49a337610d7d9452bf36515d2
SHA-256: 7f17a76aedc80b6e643df056c6bb7162da7dd21842dcbc61ecdf11bcfc2a5bfc
bind-devel-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: ec6a02a4543fc37efc0f7dba4bcab432
SHA-256: 8a46167eeaa73fa2716bd103b8d7ecb0cc8aa7f0cae77a047c9db2a7c12d0108
bind-libs-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 1d7520e0d48f789345260a53ed1d7742
SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 691c87ee06834dc4c20649443b8afd31
SHA-256: 3f3ba9ad055ca331f2cef557c3498c43e98595247fdd2443f007ba99acca1379
bind-utils-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 33481885429620ec088d56d06d8047ce
SHA-256: 786db26e1ab75829acaee8827e3dcdfd37f57d3cad5b8d0117ff91a2457686fb
 
PPC:
bind-9.2.4-37.el4.ppc.rpm
File outdated by:  RHSA-2011:1496
    MD5: 8d7aa91604862b580c50e2bcdcc4b476
SHA-256: 04e82d03170b9bbca4f85bef76dc9edc6ebed8e62ceaf7a34ec02e1b108f8a23
bind-chroot-9.2.4-37.el4.ppc.rpm
File outdated by:  RHSA-2011:1496
    MD5: cd7b1c971de4f1e5c773f621960582c4
SHA-256: 0f0d7fa71c27a7726aea899936db4efe8bfd0c0f4606d532b15f86e82bc86730
bind-devel-9.2.4-37.el4.ppc.rpm
File outdated by:  RHSA-2011:1496
    MD5: 7b78f1aca204870fdd2f8b6293f3b6d9
SHA-256: f6a4d24b4b64fff384b98a443a27f69c70c87aa672490ca2e80021fea4da1090
bind-libs-9.2.4-37.el4.ppc.rpm
File outdated by:  RHSA-2011:1496
    MD5: d75d05758108c652641caccb78518bf8
SHA-256: d5b701b796824ad02e751fafc282a1b04edbc51e17b4aa42596fdefa3bd4f5ee
bind-libs-9.2.4-37.el4.ppc64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 2011266299c28e4050aa814d9fafbfa3
SHA-256: 47a7ab93e5d03a33847a05a9e5bd0ee023f71b1b4a92be8d063104d924f3b4d3
bind-utils-9.2.4-37.el4.ppc.rpm
File outdated by:  RHSA-2011:1496
    MD5: b7aea3af1a336f24c5ca846bf10215a5
SHA-256: 69fa4717dc8d2c693fd3536ce32e8f7a232a21c2f426c6b1226be5518e4e5159
 
s390:
bind-9.2.4-37.el4.s390.rpm
File outdated by:  RHSA-2011:1496
    MD5: 5446889b911067267d22ec7117f0ff16
SHA-256: 1df9bfa0c020345a4fde7a7009fd1697e565ccad8d9faabf9079a58176428db1
bind-chroot-9.2.4-37.el4.s390.rpm
File outdated by:  RHSA-2011:1496
    MD5: 6f6117ecedce1f3015033a4a7ae16d30
SHA-256: 01dbdb7891d2b806bca48ab5fcc9db0badf1f2b083d8001a37f3de0d63aaf6d2
bind-devel-9.2.4-37.el4.s390.rpm
File outdated by:  RHSA-2011:1496
    MD5: adc4cf3778ff3811b2ac634f3695ec26
SHA-256: 7db9e5f8a2e831e019c6835942fe548b0ffc5de57b3b012fce6514db824d9d3d
bind-libs-9.2.4-37.el4.s390.rpm
File outdated by:  RHSA-2011:1496
    MD5: 97c85f3e359d0048d8ae2ed3c830e660
SHA-256: 3fae1fe84fa1d2629779cfa50080d4063d7b32065e1367e8ae654bf451b9d88f
bind-utils-9.2.4-37.el4.s390.rpm
File outdated by:  RHSA-2011:1496
    MD5: 28dc257cdda7be7e0730d336e413f5f1
SHA-256: fb4d1b180aaef78f2416032eb44dc1563a68601fc41747828f727ad15c16099a
 
s390x:
bind-9.2.4-37.el4.s390x.rpm
File outdated by:  RHSA-2011:1496
    MD5: b8bd1c12df4f3dc5237d619646f9501e
SHA-256: e64c0a08d94c25a4dedd5179cd057d10b52ed5ef63777381cf3e8510acf460a3
bind-chroot-9.2.4-37.el4.s390x.rpm
File outdated by:  RHSA-2011:1496
    MD5: ef97a97de6a58238075b2c0f7104cad9
SHA-256: beca30bfc9ef77eb856414598d572330c1f9d6f32d81624cd7291ba342199aa0
bind-devel-9.2.4-37.el4.s390x.rpm
File outdated by:  RHSA-2011:1496
    MD5: 33689019e631ea57512d1e68ad4f0b9c
SHA-256: 54a240a6ac44b5c10f98a3cb37108565eb6ceb0da4498c69775cd2e342596512
bind-libs-9.2.4-37.el4.s390.rpm
File outdated by:  RHSA-2011:1496
    MD5: 97c85f3e359d0048d8ae2ed3c830e660
SHA-256: 3fae1fe84fa1d2629779cfa50080d4063d7b32065e1367e8ae654bf451b9d88f
bind-libs-9.2.4-37.el4.s390x.rpm
File outdated by:  RHSA-2011:1496
    MD5: 74ddff076659ea0412bfd6fa25f11a28
SHA-256: 8fe6e6a4480f349b2d3cfe0f7f26af2293724e1112b3f74f3e69a8218301fc31
bind-utils-9.2.4-37.el4.s390x.rpm
File outdated by:  RHSA-2011:1496
    MD5: 920b96b3565bbaf4d8ea061b7f7531b4
SHA-256: d5569c5682e8126fb96bc895007b627ae7be7e56565f90453234484bd2646beb
 
x86_64:
bind-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: b896ab5eaef5a64a6bce4fd51f8a2d6c
SHA-256: 096bad7c0da2a2888f22590ae1a71667ea8045f8ca71dd926a8a5165329f8aaf
bind-chroot-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 67ec7fc1c2412c1891361268e2c7caba
SHA-256: 8b9b94b43e1fe14b642c87e9f9b450ff3404508072a2eaaaefc6386b175af3eb
bind-devel-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 54b6db0e3ea17bc7aa9f5ad2d14f6179
SHA-256: 5736e70e1491a39a6510d25a1c7b60ed35aa3bd39b417877c87c8092893ea6e0
bind-libs-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 1d7520e0d48f789345260a53ed1d7742
SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 69dcd80da2592d0e29cfedb6914fce94
SHA-256: 516d65fc5753634741fab00afd4914263789a158903279fe9f402d7110d7c5b7
bind-utils-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 5471bc6a3edb77da28a6d8cd9241b034
SHA-256: 19ed61d3cefec8ede7fd0ea6bef4149b12089eba783cdd57e32c0796d727fa84
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
bind-9.2.4-37.el4.src.rpm
File outdated by:  RHSA-2011:1496
    MD5: 0337a340c2f47329877762c4840b908c
SHA-256: b12775a7f4e32cd79fcf88112ae0ed89dad423411e037b51192b199cd6539296
 
IA-32:
bind-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 6b783c3df6507ed76c7646db8e942f95
SHA-256: 24f817812133807f63d1d1368abd81b6c6f6b512c1c1e76924a5aee3ea36abe6
bind-chroot-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 73445f9d4804175268e5951a5d79268c
SHA-256: ae6e31df4524202af8a22e0fb2b69d0cc2c61d884be8075b9a1c5ae668824883
bind-devel-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: ec97eea7a0b841754f82513e95909956
SHA-256: ab70627cfa4be7423fb66c6a012bd6334d047c364189921f6045b6fc848bdc43
bind-libs-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 1d7520e0d48f789345260a53ed1d7742
SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-utils-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 5da699ce8aca8f499db2081685eb0012
SHA-256: 1a0c57910878fbaf87c8b476a8647b5921c6dd8c6e9d511dec6705af6a2f27f5
 
IA-64:
bind-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: f9fd8975693c65df01724aea4c82fde5
SHA-256: ec03f93f1b1af70e19bfc38824d004d1ac6e2542fccd9a1d8fc6cc5079f33a24
bind-chroot-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: c175f1e49a337610d7d9452bf36515d2
SHA-256: 7f17a76aedc80b6e643df056c6bb7162da7dd21842dcbc61ecdf11bcfc2a5bfc
bind-devel-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: ec6a02a4543fc37efc0f7dba4bcab432
SHA-256: 8a46167eeaa73fa2716bd103b8d7ecb0cc8aa7f0cae77a047c9db2a7c12d0108
bind-libs-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 1d7520e0d48f789345260a53ed1d7742
SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 691c87ee06834dc4c20649443b8afd31
SHA-256: 3f3ba9ad055ca331f2cef557c3498c43e98595247fdd2443f007ba99acca1379
bind-utils-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 33481885429620ec088d56d06d8047ce
SHA-256: 786db26e1ab75829acaee8827e3dcdfd37f57d3cad5b8d0117ff91a2457686fb
 
x86_64:
bind-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: b896ab5eaef5a64a6bce4fd51f8a2d6c
SHA-256: 096bad7c0da2a2888f22590ae1a71667ea8045f8ca71dd926a8a5165329f8aaf
bind-chroot-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 67ec7fc1c2412c1891361268e2c7caba
SHA-256: 8b9b94b43e1fe14b642c87e9f9b450ff3404508072a2eaaaefc6386b175af3eb
bind-devel-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 54b6db0e3ea17bc7aa9f5ad2d14f6179
SHA-256: 5736e70e1491a39a6510d25a1c7b60ed35aa3bd39b417877c87c8092893ea6e0
bind-libs-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 1d7520e0d48f789345260a53ed1d7742
SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 69dcd80da2592d0e29cfedb6914fce94
SHA-256: 516d65fc5753634741fab00afd4914263789a158903279fe9f402d7110d7c5b7
bind-utils-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 5471bc6a3edb77da28a6d8cd9241b034
SHA-256: 19ed61d3cefec8ede7fd0ea6bef4149b12089eba783cdd57e32c0796d727fa84
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
bind-9.2.4-37.el4.src.rpm
File outdated by:  RHSA-2011:1496
    MD5: 0337a340c2f47329877762c4840b908c
SHA-256: b12775a7f4e32cd79fcf88112ae0ed89dad423411e037b51192b199cd6539296
 
IA-32:
bind-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 6b783c3df6507ed76c7646db8e942f95
SHA-256: 24f817812133807f63d1d1368abd81b6c6f6b512c1c1e76924a5aee3ea36abe6
bind-chroot-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 73445f9d4804175268e5951a5d79268c
SHA-256: ae6e31df4524202af8a22e0fb2b69d0cc2c61d884be8075b9a1c5ae668824883
bind-devel-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: ec97eea7a0b841754f82513e95909956
SHA-256: ab70627cfa4be7423fb66c6a012bd6334d047c364189921f6045b6fc848bdc43
bind-libs-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 1d7520e0d48f789345260a53ed1d7742
SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-utils-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 5da699ce8aca8f499db2081685eb0012
SHA-256: 1a0c57910878fbaf87c8b476a8647b5921c6dd8c6e9d511dec6705af6a2f27f5
 
IA-64:
bind-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: f9fd8975693c65df01724aea4c82fde5
SHA-256: ec03f93f1b1af70e19bfc38824d004d1ac6e2542fccd9a1d8fc6cc5079f33a24
bind-chroot-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: c175f1e49a337610d7d9452bf36515d2
SHA-256: 7f17a76aedc80b6e643df056c6bb7162da7dd21842dcbc61ecdf11bcfc2a5bfc
bind-devel-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: ec6a02a4543fc37efc0f7dba4bcab432
SHA-256: 8a46167eeaa73fa2716bd103b8d7ecb0cc8aa7f0cae77a047c9db2a7c12d0108
bind-libs-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 1d7520e0d48f789345260a53ed1d7742
SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 691c87ee06834dc4c20649443b8afd31
SHA-256: 3f3ba9ad055ca331f2cef557c3498c43e98595247fdd2443f007ba99acca1379
bind-utils-9.2.4-37.el4.ia64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 33481885429620ec088d56d06d8047ce
SHA-256: 786db26e1ab75829acaee8827e3dcdfd37f57d3cad5b8d0117ff91a2457686fb
 
x86_64:
bind-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: b896ab5eaef5a64a6bce4fd51f8a2d6c
SHA-256: 096bad7c0da2a2888f22590ae1a71667ea8045f8ca71dd926a8a5165329f8aaf
bind-chroot-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 67ec7fc1c2412c1891361268e2c7caba
SHA-256: 8b9b94b43e1fe14b642c87e9f9b450ff3404508072a2eaaaefc6386b175af3eb
bind-devel-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 54b6db0e3ea17bc7aa9f5ad2d14f6179
SHA-256: 5736e70e1491a39a6510d25a1c7b60ed35aa3bd39b417877c87c8092893ea6e0
bind-libs-9.2.4-37.el4.i386.rpm
File outdated by:  RHSA-2011:1496
    MD5: 1d7520e0d48f789345260a53ed1d7742
SHA-256: aa6358dd94cf9fc2a2086b43b7625a449521c3dc91004b227abba67001f0e381
bind-libs-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 69dcd80da2592d0e29cfedb6914fce94
SHA-256: 516d65fc5753634741fab00afd4914263789a158903279fe9f402d7110d7c5b7
bind-utils-9.2.4-37.el4.x86_64.rpm
File outdated by:  RHSA-2011:1496
    MD5: 5471bc6a3edb77da28a6d8cd9241b034
SHA-256: 19ed61d3cefec8ede7fd0ea6bef4149b12089eba783cdd57e32c0796d727fa84
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

455540 - named init script doesn't wait for server terminaton
462060 - named service crashes with an assertion failed message
475202 - named crashes on incorrect usage of rndc reload command
476515 - RHEL4: bind-9.2.4-30.el4 and too many open files
518866 - named stops responding after an unexpected error in client.c
559524 - host should return non-zero status in case of error


Keywords

destination, host, IPv4-mapped, request's, SO_REUSEADDR


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/