Bug 82645 - SEGV in __res_nquery (/lib/libresolv.so.2)
SEGV in __res_nquery (/lib/libresolv.so.2)
Status: CLOSED ERRATA
Product: Red Hat Linux
Classification: Retired
Component: glibc (Show other bugs)
8.0
i386 Linux
medium Severity high
: ---
: ---
Assigned To: Jakub Jelinek
Brian Brock
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2003-01-24 08:16 EST by Michael Marxmeier
Modified: 2016-11-24 09:49 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2003-04-10 19:09:20 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Michael Marxmeier 2003-01-24 08:16:15 EST
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3b) Gecko/20030119

Description of problem:
With RH 8.0 our application gets a SEGV during reverse 
DNS lookup.

Program received signal SIGSEGV, Segmentation fault.
0x40556c34 in __res_nquery () from /lib/libresolv.so.2

Application stack dump:

#0  0x40556c34 in __res_nquery () from /lib/libresolv.so.2
#1  0x4001d235 in _nss_dns_gethostbyaddr_r () from /lib/libnss_dns.so.2
#2  0x420ed6d9 in gethostbyaddr_r@@GLIBC_2.1.2 () from /lib/i686/libc.so.6
#3  0x420ed4c5 in gethostbyaddr () from /lib/i686/libc.so.6
#4  0x0804c8dd in tcp_decode_addr_in (p_addr_in=0x80f5bb4, p_addr=0x19, 
    p_port=0xd, p_name=0x80f5be8)
    at eloq/src/B0632/eloq/util/tcputil.c:811
#5  0x0804c948 in tcp_peer_addr (sockfd=8, peer_addr=0x80f5bec, 
    peer_port=0x80f5bf2, peer_name=0x80f5be8)
    at /eloq/src/B0632/eloq/util/tcputil.c:839
#6  0x0804f2b2 in accept_server_connection ()
    at /eloq/src/B0632/eqdb/teqdb6/event.c:184
#7  0x0804f818 in check_tcpip_request ()
    at /eloq/src/B0632/eqdb/teqdb6/event.c:596

Might be related to bug #77467


Version-Release number of selected component (if applicable):
glibc-2.2.93-5

How reproducible:
Always

Steps to Reproduce:
Any remote reverse dns lookup crashes the server process. 

Additional info:
This might be related to limited stack space (threads)
but extending the stack to 64k did not make a difference.
Comment 1 Jakub Jelinek 2003-01-26 16:54:40 EST
Please try rawhide glibc.
Comment 2 Jakub Jelinek 2003-04-10 19:09:20 EDT
An errata has been issued which should help the problem described in this bug report. 
This report is therefore being closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, please follow the link below. You may reopen 
this bug report if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2003-089.html

Note You need to log in before you can comment on or make changes to this bug.