More repro reports etc:
--------------------------------------------
From: Stephen Oberther <[EMAIL PROTECTED]>
Hmmm..it doesn't have the same affect on our machine. i386 with Debian
2.2 running a home compiled BIND-9.1.0 Must be something in the
configuration of the NetBSD package.
----------------------------------
From: Raptor <[EMAIL PROTECTED]>
I tried on this box:
narcissism:raptor {3} uname -a
OpenBSD narcissism 2.8 NARCISSISM#0 i386
;; ANSWER SECTION:
version.bind. 0S CHAOS TXT "9.1.0"
Named continued working perfectly. We installed it from source
distribution tarballs (non from ports) and it's running in a chrooted
environment.
------------------------------------------
From: "Bryan Paxton" <[EMAIL PROTECTED]>
Tested on Linux-2.4.2-pre1 (x86 SMP)| ISC BIND 9.1.0 | nmap version 2.12
Results: Didn't crash : )
-----------------------------------
From: Max Parke <[EMAIL PROTECTED]>
> From [EMAIL PROTECTED] Tue Feb 6 21:40:07 2001
> Feb 5 22:30:35 tel named[50956]: netaddr.c:231: INSIST(0) failed
> Feb 5 22:30:35 tel named[50956]: exiting (due to assertion failure)
> Feb 5 22:30:35 tel /kernel: pid 50956 (named), uid 1111: exited on
> signal 6
hrm.. no, mine is much different.
ugh. I hate BIND.
-lucas
Feb 6 21:05:55 xxxxx /usr/bind/named[56945]: client 123.123.123.150#1279:
error sending response: operation canceled
Feb 6 21:05:55 xxxxx /usr/bind/named[56945]: client 123.123.123.150#1280:
error sending response: operation canceled
Feb 6 21:05:55 xxxxx /usr/bind/named[56945]: client 123.123.123.151#1166:
error sending response: operation canceled
Feb 6 21:06:15 xxxxx last message repeated 211 times
Feb 6 21:06:16 xxxxx /usr/bind/named[56945]: client 10.1.1.2#137: error
sending response: operation canceled
Feb 6 21:06:45 xxxxx /usr/bind/named[56945]: mem.c:1404:
REQUIRE(mpctx->allocated == 0) failed
Feb 6 21:06:45 xxxxx /usr/bind/named[56945]: exiting (due to assertion
failure)
Feb 6 16:06:45 xxxxx /kernel: pid 56945 (named), uid 53: exited on signal
6
Ben Greenbaum
Director of Site Content
SecurityFocus
http://www.securityfocus.com