stack-based critical buffer overflow was found in the way the libresolv library (glibc) performed dual A/AAAA DNS queries.A remote attacker could crash or, potentially, execute code running the library on Linux.
I unfortunately don't know how to get logs off the system to send in :(I confirm same kind of problem in Precise. 21-Mar-2017 .578 queries: client x.x.x.x#43836 ( query: TYPE20736 - (x.x.x.x) I realize this is not directly related to the subject of this bug, but I think its relevant. I'm unable to install any 14.04 from my PXE server.
How do I patch and protect my server or workstation against the glibc getaddrinfo on Linux operating system?
All the versions of glibc since 2.9 are affected by this bug.
telnet: Unable to connect to remote host: Network is unreachable %% Direct protocol direction works fine: %% telnet -6 443 Trying 2a50: Hi To extend the info on this one: unattended-upgrades updated this package today, and caused the same issue for me, causing servers to stop resolving DNS internally.
I believe changing the file to use an IP address for the archive instead of the domain name will work around this; it's not a good long term solution since it messes up ubuntu's dns load balancing, but if you need to perform an install this might work. d-i mirror/Thanks to Eric for suggesting the workaround.