summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/bind/bind/CVE-2015-1349.patch
diff options
context:
space:
mode:
authorSona Sarmadi <sona.sarmadi@enea.com>2016-04-08 10:21:05 +0200
committerSona Sarmadi <sona.sarmadi@enea.com>2016-04-08 12:32:13 +0200
commit3f66cbfdff13798a6893abb7a43d45abc7004a49 (patch)
tree564c0c8c779df88482ca94398ac23de08c1ef918 /meta/recipes-connectivity/bind/bind/CVE-2015-1349.patch
parentc916152b1fa7806a32f1e9b35d89fae9d29894d0 (diff)
downloadpoky-3f66cbfdff13798a6893abb7a43d45abc7004a49.tar.gz
bind: CVE-2015-1349 CVE-2015-4620 CVE-2015-5722
CVE-2015-1349: https://kb.isc.org/article/AA-01235/0/CVE-2015-1349%3A- A-Problem-with-Trust-Anchor-Management-Can-Cause-named-to-Crash.html CVE-2015-4620 https://kb.isc.org/article/AA-01267/0/CVE-2015-4620%3A- Specially-Constructed-Zone-Data-Can-Cause-a-Resolver-to-Crash-when-Validating.html CVE-2015-5722 https://kb.isc.org/article/AA-01287/0/CVE-2015-5722%3A- Parsing-malformed-keys-may-cause-BIND-to-exit-due-to-a-failed-assertion-in-buffer.c.html (From OE-Core rev: d3af844b05e566c2188fc3145e66a9826fed0ec8) Reference: https://kb.isc.org/category/74/0/10/Software-Products/BIND9/Security-Advisories/ Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Diffstat (limited to 'meta/recipes-connectivity/bind/bind/CVE-2015-1349.patch')
-rw-r--r--meta/recipes-connectivity/bind/bind/CVE-2015-1349.patch60
1 files changed, 60 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/bind/bind/CVE-2015-1349.patch b/meta/recipes-connectivity/bind/bind/CVE-2015-1349.patch
new file mode 100644
index 0000000000..dea7aaef53
--- /dev/null
+++ b/meta/recipes-connectivity/bind/bind/CVE-2015-1349.patch
@@ -0,0 +1,60 @@
1CVE-2015-1349 bind: issue in trust anchor management can cause named to crash
2
3commit 2e9d79f169663c9aff5f0dcdc626a2cd2dbb5892
4Author: Evan Hunt <each@isc.org>
5Date: Tue Feb 3 18:30:38 2015 -0800
6
7 [v9_9_6_patch] avoid crash due to managed-key rollover
8
9 4053. [security] Revoking a managed trust anchor and supplying
10 an untrusted replacement could cause named
11 to crash with an assertion failure.
12 (CVE-2015-1349) [RT #38344]
13
14Upstream Status: Backport from Redhat
15
16https://bugzilla.redhat.com/attachment.cgi?id=993045
17
18Signed-off-by: Armin Kuster <akuster@mvista.com>
19
20Index: bind-9.9.5/CHANGES
21===================================================================
22--- bind-9.9.5.orig/CHANGES
23+++ bind-9.9.5/CHANGES
24@@ -1,3 +1,10 @@
25+ --- 9.9.6-P2 released ---
26+
27+4053. [security] Revoking a managed trust anchor and supplying
28+ an untrusted replacement could cause named
29+ to crash with an assertion failure.
30+ (CVE-2015-1349) [RT #38344]
31+
32 --- 9.9.5 released ---
33
34 --- 9.9.5rc2 released ---
35Index: bind-9.9.5/lib/dns/zone.c
36===================================================================
37--- bind-9.9.5.orig/lib/dns/zone.c
38+++ bind-9.9.5/lib/dns/zone.c
39@@ -8496,6 +8496,12 @@ keyfetch_done(isc_task_t *task, isc_even
40 namebuf, tag);
41 trustkey = ISC_TRUE;
42 }
43+ } else {
44+ /*
45+ * No previously known key, and the key is not
46+ * secure, so skip it.
47+ */
48+ continue;
49 }
50
51 /* Delete old version */
52@@ -8544,7 +8550,7 @@ keyfetch_done(isc_task_t *task, isc_even
53 trust_key(zone, keyname, &dnskey, mctx);
54 }
55
56- if (!deletekey)
57+ if (secure && !deletekey)
58 set_refreshkeytimer(zone, &keydata, now);
59 }
60