Greetings.

Yesterday morning one of our BIND daemons crashed.  The following messages were 
logged in named.run at the time:

07-Dec-2022 11:58:37.097 general: critical: netmgr.c:687: 
REQUIRE((__builtin_expect(!!((sock) != ((void *)0)), 1) && 
__builtin_expect(!!(((const isc__magic_t *)(sock))->magic == ((('N') << 24 | 
('M') << 16 | ('S') << 8 | ('K')))), 1))) failed, back trace
07-Dec-2022 11:58:37.097 general: critical: #0 0x56508c798e43 in ??
07-Dec-2022 11:58:37.097 general: critical: #1 0x7fa72e881ac0 in ??
07-Dec-2022 11:58:37.097 general: critical: #2 0x7fa72e89978a in ??
07-Dec-2022 11:58:37.097 general: critical: #3 0x7fa72e89a240 in ??
07-Dec-2022 11:58:37.097 general: critical: #4 0x7fa72e89e18b in ??
07-Dec-2022 11:58:37.097 general: critical: #5 0x7fa72eb67707 in ??
07-Dec-2022 11:58:37.097 general: critical: #6 0x7fa72eb68fe9 in ??
07-Dec-2022 11:58:37.097 general: critical: #7 0x7fa72eb779b0 in ??
07-Dec-2022 11:58:37.097 general: critical: #8 0x7fa72eb7f9a7 in ??
07-Dec-2022 11:58:37.097 general: critical: #9 0x7fa72eb8116e in ??
07-Dec-2022 11:58:37.097 general: critical: #10 0x7fa72eb816cd in ??
07-Dec-2022 11:58:37.097 general: critical: #11 0x7fa72eb823c9 in ??
07-Dec-2022 11:58:37.097 general: critical: #12 0x7fa72eb884c6 in ??
07-Dec-2022 11:58:37.097 general: critical: #13 0x7fa72e8a8fa1 in ??
07-Dec-2022 11:58:37.097 general: critical: #14 0x7fa72e370609 in ??
07-Dec-2022 11:58:37.097 general: critical: #15 0x7fa72e28f133 in ??
07-Dec-2022 11:58:37.097 general: critical: exiting (due to assertion failure)

This is bind9 1:9.16.1-0ubuntu2.11 running on Ubuntu 20.04.5 LTS (fully 
patched).  Has this issue been seen before?  If so, has it been fixed, or is it 
being fixed?  Is this the right forum for this posting?

More generally ... to what extent do you update the Ubuntu bind9 package?  Is 
it literally the 9.16.1 base source code (in focal) with no updates other than 
to patch the CVE security vulnerabilities?  Or are there other patches in it as 
well?  For a given Ubuntu LTS version (such as focal), do you ever "start over" 
with the newest minor release of that branch of BIND (9.16 for focal, 9.18 for 
jammy)?  Or do you just continue patching the initial release of the branch?  
Is there a specific version of 9.16 that you can say 1:9.16.1-0ubuntu2.11 is 
equivalent to in terms of patches (both security and non-security)?  Do you 
recommend for or against Ubuntu users using the BIND packages in ISC's PPA 
repository instead of the bind9 package in the Ubuntu repository?

Thanks,
Ben Bridges

[City Utilities]

[SpringNet]<http://www.springnet.net>

Sales 417.575.7000 | Support 417.874.8000 | 
springnet.net<http://www.springnet.net>
-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss

Reply via email to