Bug 56667 - named.service (formerly bind9) segfaults
Summary: named.service (formerly bind9) segfaults
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: DNS
Version: UCS 5.2
Hardware: Other Linux
: P5 normal
Target Milestone: UCS 5.2
Assignee: Julia Bremer
QA Contact: Juan Carlos
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-09-27 10:25 CEST by Juan Carlos
Modified: 2025-02-05 15:08 CET (History)
3 users (show)

See Also:
What kind of report is it?: Development Internal
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Juan Carlos univentionstaff 2023-09-27 10:25:55 CEST
Backtrace:

Sep 27 10:06:54 ucs-6324 named[84518]: resolver priming query complete: success
Sep 27 10:06:54 ucs-6324 named[84518]: samba_dlz: allowing update of signer=UCS-6324\$\@UCS.INET name=_gc._tcp.ucs.inet tcpaddr=10.200.95.7 type=SRV key=2532773450.sig-ucs-6324.ucs.inet/159/0
Sep 27 10:06:54 ucs-6324 named[84518]: samba_dlz: starting transaction on zone ucs.inet
Sep 27 10:06:54 ucs-6324 named[84518]: client @0x7fd69290a568 10.200.95.7#37069/key UCS-6324\$\@UCS.INET: updating zone 'ucs.inet/NONE': adding an RR at '_gc._tcp.ucs.inet' SRV 0 100 3268 ucs-6324.ucs.inet.
Sep 27 10:06:54 ucs-6324 named[84518]: name.c:664: REQUIRE(((name1) != ((void *)0) && ((const isc__magic_t *)(name1))->magic == ((('D') << 24 | ('N') << 16 | ('S') << 8 | ('n'))))) failed, back trace
Sep 27 10:06:54 ucs-6324 named[84518]: /usr/sbin/named(+0x26334) [0x5600cf63c334]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libisc-9.18.12-1A~5.2.0.202303161056-Debian.so(isc_assertion_failed+0xa) [0x7fd6a0639a5a]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libdns-9.18.12-1A~5.2.0.202303161056-Debian.so(dns_name_equal+0x179) [0x7fd6a02999d9]
Sep 27 10:06:54 ucs-6324 named[84518]: /usr/lib/x86_64-linux-gnu/samba/bind9/dlz_bind9_11.so(dlz_addrdataset+0x3d8) [0x7fd69f6f7078]
Sep 27 10:06:54 ucs-6324 named[84518]: /usr/sbin/named(+0x22494) [0x5600cf638494]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libdns-9.18.12-1A~5.2.0.202303161056-Debian.so(+0x12e4c4) [0x7fd6a032e4c4]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libdns-9.18.12-1A~5.2.0.202303161056-Debian.so(+0x4ec17) [0x7fd6a024ec17]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libns-9.18.12-1A~5.2.0.202303161056-Debian.so(+0x31dca) [0x7fd6a0c1fdca]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libns-9.18.12-1A~5.2.0.202303161056-Debian.so(+0x35466) [0x7fd6a0c23466]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libisc-9.18.12-1A~5.2.0.202303161056-Debian.so(isc_task_run+0x113) [0x7fd6a0658a43]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libisc-9.18.12-1A~5.2.0.202303161056-Debian.so(+0x26cb2) [0x7fd6a0626cb2]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libisc-9.18.12-1A~5.2.0.202303161056-Debian.so(+0x27337) [0x7fd6a0627337]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libisc-9.18.12-1A~5.2.0.202303161056-Debian.so(+0x27e73) [0x7fd6a0627e73]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libuv.so.1(+0xf09d) [0x7fd6a059109d]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libuv.so.1(+0x22e3c) [0x7fd6a05a4e3c]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libuv.so.1(uv_run+0xc4) [0x7fd6a05919e4]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libisc-9.18.12-1A~5.2.0.202303161056-Debian.so(+0x27654) [0x7fd6a0627654]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libisc-9.18.12-1A~5.2.0.202303161056-Debian.so(isc__trampoline_run+0x15) [0x7fd6a0661575]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libc.so.6(+0x88fd4) [0x7fd69f8fbfd4]
Sep 27 10:06:54 ucs-6324 named[84518]: /lib/x86_64-linux-gnu/libc.so.6(+0x1095bc) [0x7fd69f97c5bc]
Sep 27 10:06:54 ucs-6324 named[84518]: exiting (due to assertion failure)
Sep 27 10:06:55 ucs-6324 systemd[1]: named.service: Main process exited, code=dumped, status=6/ABRT

How to reproduce:

On a replica server running samba4, run:

ucs-test -s base -E dangerous
Comment 1 Florian Best univentionstaff 2023-09-27 10:58:37 CEST
Maybe related to the migrated patches in Bug #55796.
Comment 3 Juan Carlos univentionstaff 2023-09-28 07:11:34 CEST
More info:

named crashes during the execution of 01_base/02server_password_change
Comment 4 Florian Best univentionstaff 2023-10-04 17:26:37 CEST
Julia added the upstream patch:

4e8d041e1311 | Fix named crashes on dlz update

https://bugzilla.samba.org/show_bug.cgi?id=14030
+From c3339584a967051e8632d9778d46e1aea7d2f235 Mon Sep 17 00:00:00 2001
+From: Samuel Cabrero <scabrero@samba.org>
+Date: Wed, 18 Jan 2023 17:25:29 +0100
+Subject: [PATCH] s4:dnsserver: Rename dns_name_equal() to
+ samba_dns_name_equal()
+
+This function already exists in bind9 but takes different arguments, so when
+the DLZ is loaded and this function is called bind crashes:
+
+  named[1523]: samba_dlz: allowing update of signer=DESKTOP-8BUKMBK\$\@AFOREST.AD name=118.101.168.192.in-addr.arpa tcpaddr=192.168.101.118  type=PTR key=1264-ms-7.1-2ac9.9ef238e1-9747-11ed-9f95-525400dc6981/159/0
+  named[1523]: samba_dlz: allowing update of signer=DESKTOP-8BUKMBK\$\@AFOREST.AD name=118.101.168.192.in-addr.arpa tcpaddr=192.168.101.118  type=PTR key=1264-ms-7.1-2ac9.9ef238e1-9747-11ed-9f95-525400dc6981/159/0
+  named[1523]: client @0x7f26caa90f68 192.168.101.118#58223/key DESKTOP-8BUKMBK\$\@AFOREST.AD: updating zone '101.168.192.in-addr.arpa/NONE': deleting rrset at '118.101.168.192.in-addr.ar
+  named[1523]: name.c:664: REQUIRE(((name1) != ((void *)0) && ((const isc__magic_t *)(name1))->magic == ((('D') << 24 | ('N') << 16 | ('S') << 8 | ('n'))))) failed, back trace
Comment 5 Juan Carlos univentionstaff 2023-10-09 13:06:12 CEST
QA:

- Package built.
- Segmentation fault fixed.
Comment 6 Florian Best univentionstaff 2024-03-08 10:56:05 CET
univention-bind (16.0.2)
39a314196cf2 | Bug #56667: Update samba bind shared libararies to bind9_18

univention-bind (15.0.3)
3d03e9dba95d | Bug #56667: update Samba bind shared libararies to bind9_16