2013-12-05 02:21:34 |
Joshua Rogers |
bug |
|
|
added bug |
2013-12-05 09:30:09 |
Yolanda Robla |
bind9 (Ubuntu): status |
New |
Confirmed |
|
2013-12-05 09:30:14 |
Yolanda Robla |
bind9 (Ubuntu): importance |
Undecided |
High |
|
2022-03-15 23:53:53 |
Sergio Durigan Junior |
summary |
DiG crashes on +nssearch with +tcp [Outdated in Ubuntu repo] |
DiG crashes on +nssearch with +tcp in bind9 9.18 |
|
2022-03-15 23:57:22 |
Sergio Durigan Junior |
bug |
|
|
added subscriber Sergio Durigan Junior |
2022-03-15 23:57:29 |
Sergio Durigan Junior |
bug |
|
|
added subscriber Ubuntu Server |
2022-03-15 23:57:37 |
Sergio Durigan Junior |
bind9 (Ubuntu): status |
Confirmed |
Triaged |
|
2022-03-16 00:00:40 |
Sergio Durigan Junior |
nominated for series |
|
Ubuntu Jammy |
|
2022-03-16 00:00:40 |
Sergio Durigan Junior |
bug task added |
|
bind9 (Ubuntu Jammy) |
|
2022-03-16 00:04:15 |
Sergio Durigan Junior |
bug watch added |
|
https://gitlab.isc.org/isc-projects/bind9/-/issues/3144 |
|
2022-03-16 00:04:15 |
Sergio Durigan Junior |
bug watch added |
|
https://gitlab.isc.org/isc-projects/bind9/-/issues/3207 |
|
2023-02-13 21:58:10 |
Lena Voytek |
merge proposal linked |
|
https://code.launchpad.net/~lvoytek/ubuntu/+source/bind9/+git/bind9/+merge/436801 |
|
2023-02-13 21:58:46 |
Lena Voytek |
merge proposal unlinked |
https://code.launchpad.net/~lvoytek/ubuntu/+source/bind9/+git/bind9/+merge/436801 |
|
|
2023-02-13 22:08:03 |
Lena Voytek |
merge proposal linked |
|
https://code.launchpad.net/~lvoytek/ubuntu/+source/bind9/+git/bind9/+merge/437223 |
|
2023-03-08 21:46:05 |
Lena Voytek |
description |
Precursor: 'DiG' is provided in the package "bind9", and the version in DiG is the same version of bind9.
Whilst running 'DiG', with +ssearch, AND +tcp, on the DiG version that is available in the repo's("DiG 9.8.1-P1"), the program segfaults with a core dump.
Example:
13:13:14 (toil@laptop) ~ $ dig -v
DiG 9.8.1-P1
13:13:37 (toil@laptop) ~ $ dig +time=3 +nssearch +tcp internot.info
socket.c:2535: REQUIRE(socketp != ((void *)0) && *socketp == ((void *)0)) failed, back trace
#0 0x4f877b in ??
#1 0x4f86c4 in ??
#2 0x52b062 in ??
#3 0xfd03ef in ??
#4 0xfd07c3 in ??
#5 0x51b9ac in ??
#6 0x7cdd4c in ??
#7 0x1ffbae in ??
Aborted (core dumped)
It's strange that it gives a back trace, but that's irrelevant anyways.
Although I'm unsure of which version exactly it's fixed in, but it doesn't work in "DiG 9.10.0a1".
It also seems to be patched in "DiG 9.8.4-P2", but that probably isn't useful (due to the P2)..
ProblemType: Bug
DistroRelease: Ubuntu 12.04
Package: bind9-host 1:9.8.1.dfsg.P1-4ubuntu0.7
ProcVersionSignature: Ubuntu 3.2.0-56.86-generic 3.2.51
Uname: Linux 3.2.0-56-generic i686
NonfreeKernelModules: wl
ApportVersion: 2.0.1-0ubuntu17.6
Architecture: i386
Date: Thu Dec 5 13:11:08 2013
EcryptfsInUse: Yes
InstallationMedia: Ubuntu 10.04 LTS "Lucid Lynx" - Release i386 (20100429)
MarkForUpload: True
ProcEnviron:
TERM=xterm
PATH=(custom, no user)
LANG=en_AU.UTF-8
SHELL=/bin/bash
SourcePackage: bind9
UpgradeStatus: Upgraded to precise on 2013-08-26 (100 days ago) |
[Impact]
When using dig with the +nssearch and +tcp options, the application will crash with a core dump.
The fix should be backported to Kinetic and Jammy to allow users to get all results of an nssearch through tcp on a domain.
The bug will be fixed by the minor release update described in (LP: #2003586) through upstream correcting IPv6 functionality.
[Test Plan]
# lxc launch images:ubuntu/{kinetic, jammy} test-bind9
# lxc exec test-bind9
# apt update && apt dist-upgrade -y
# apt install dnsutils -y
# dig google.com +nssearch +tcp
- Before the update this leads to a crash ending in "Aborted (core dumped)" without showing all addresses while after it will show that there was a communication error with addresses it did not get a response from and finish running through all addresses
[Where problems could occur]
Problems could occour in multiple areas outside of this fix because it is being added in a minor release update. Issues directly related to this fix would arise in the functionality of dig +nssearch +tcp, likely related to the handling of domains containing IPv6 addresses.
[Original Description]
Precursor: 'DiG' is provided in the package "bind9", and the version in DiG is the same version of bind9.
Whilst running 'DiG', with +ssearch, AND +tcp, on the DiG version that is available in the repo's("DiG 9.8.1-P1"), the program segfaults with a core dump.
Example:
13:13:14 (toil@laptop) ~ $ dig -v
DiG 9.8.1-P1
13:13:37 (toil@laptop) ~ $ dig +time=3 +nssearch +tcp internot.info
socket.c:2535: REQUIRE(socketp != ((void *)0) && *socketp == ((void *)0)) failed, back trace
#0 0x4f877b in ??
#1 0x4f86c4 in ??
#2 0x52b062 in ??
#3 0xfd03ef in ??
#4 0xfd07c3 in ??
#5 0x51b9ac in ??
#6 0x7cdd4c in ??
#7 0x1ffbae in ??
Aborted (core dumped)
It's strange that it gives a back trace, but that's irrelevant anyways.
Although I'm unsure of which version exactly it's fixed in, but it doesn't work in "DiG 9.10.0a1".
It also seems to be patched in "DiG 9.8.4-P2", but that probably isn't useful (due to the P2)..
ProblemType: Bug
DistroRelease: Ubuntu 12.04
Package: bind9-host 1:9.8.1.dfsg.P1-4ubuntu0.7
ProcVersionSignature: Ubuntu 3.2.0-56.86-generic 3.2.51
Uname: Linux 3.2.0-56-generic i686
NonfreeKernelModules: wl
ApportVersion: 2.0.1-0ubuntu17.6
Architecture: i386
Date: Thu Dec 5 13:11:08 2013
EcryptfsInUse: Yes
InstallationMedia: Ubuntu 10.04 LTS "Lucid Lynx" - Release i386 (20100429)
MarkForUpload: True
ProcEnviron:
TERM=xterm
PATH=(custom, no user)
LANG=en_AU.UTF-8
SHELL=/bin/bash
SourcePackage: bind9
UpgradeStatus: Upgraded to precise on 2013-08-26 (100 days ago) |
|
2023-03-08 21:46:10 |
Lena Voytek |
bind9 (Ubuntu): status |
Triaged |
Fix Released |
|
2023-03-08 21:46:13 |
Lena Voytek |
bind9 (Ubuntu Jammy): status |
Triaged |
In Progress |
|
2023-03-08 21:46:16 |
Lena Voytek |
bind9 (Ubuntu Jammy): assignee |
|
Lena Voytek (lvoytek) |
|
2023-03-17 17:11:18 |
Steve Langasek |
bind9 (Ubuntu Kinetic): status |
New |
Fix Committed |
|
2023-03-17 17:11:20 |
Steve Langasek |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2023-03-17 17:11:22 |
Steve Langasek |
bug |
|
|
added subscriber SRU Verification |
2023-03-17 17:11:27 |
Steve Langasek |
tags |
apport-bug i386 precise |
apport-bug i386 precise verification-needed verification-needed-kinetic |
|
2023-03-17 17:20:18 |
Steve Langasek |
bind9 (Ubuntu Jammy): status |
In Progress |
Fix Committed |
|
2023-03-17 17:20:24 |
Steve Langasek |
tags |
apport-bug i386 precise verification-needed verification-needed-kinetic |
apport-bug i386 precise verification-needed verification-needed-jammy verification-needed-kinetic |
|
2023-03-22 22:55:07 |
Lena Voytek |
tags |
apport-bug i386 precise verification-needed verification-needed-jammy verification-needed-kinetic |
apport-bug i386 precise verification-done verification-done-jammy verification-done-kinetic |
|
2023-03-29 03:35:53 |
Launchpad Janitor |
bind9 (Ubuntu Jammy): status |
Fix Committed |
Fix Released |
|
2023-03-29 03:35:53 |
Launchpad Janitor |
cve linked |
|
2022-1183 |
|
2023-03-29 03:35:53 |
Launchpad Janitor |
cve linked |
|
2022-2795 |
|
2023-03-29 03:35:53 |
Launchpad Janitor |
cve linked |
|
2022-2881 |
|
2023-03-29 03:35:53 |
Launchpad Janitor |
cve linked |
|
2022-2906 |
|
2023-03-29 03:35:53 |
Launchpad Janitor |
cve linked |
|
2022-3080 |
|
2023-03-29 03:35:53 |
Launchpad Janitor |
cve linked |
|
2022-3094 |
|
2023-03-29 03:35:53 |
Launchpad Janitor |
cve linked |
|
2022-3736 |
|
2023-03-29 03:35:53 |
Launchpad Janitor |
cve linked |
|
2022-38178 |
|
2023-03-29 03:35:53 |
Launchpad Janitor |
cve linked |
|
2022-3924 |
|
2023-03-29 03:36:17 |
Chris Halse Rogers |
removed subscriber Ubuntu Stable Release Updates Team |
|
|
|
2023-03-29 03:37:10 |
Launchpad Janitor |
bind9 (Ubuntu Kinetic): status |
Fix Committed |
Fix Released |
|