From: akuster808 <akuster808@gmail.com>
To: Sona Sarmadi <sona.sarmadi@enea.com>,
openembedded-core@lists.openembedded.org
Subject: Re: [dizzy][PATCH] bind9.9.5: CVE-2015-5477
Date: Wed, 19 Aug 2015 18:02:39 -0700 [thread overview]
Message-ID: <55D5272F.3050701@gmail.com> (raw)
In-Reply-To: <1438256935-6126-1-git-send-email-sona.sarmadi@enea.com>
On 7/30/15 4:48 AM, Sona Sarmadi wrote:
> Fixed a flaw in the way BIND handled requests for TKEY
> DNS resource records.
>
> References:
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477
> https://kb.isc.org/article/AA-01272
>
> Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Merged to staging.
thanks,
Armin
> ---
> .../bind/bind/bind9_9_5-CVE-2015-5477.patch | 45 ++++++++++++++++++++++
> meta/recipes-connectivity/bind/bind_9.9.5.bb | 1 +
> 2 files changed, 46 insertions(+)
> create mode 100644 meta/recipes-connectivity/bind/bind/bind9_9_5-CVE-2015-5477.patch
>
> diff --git a/meta/recipes-connectivity/bind/bind/bind9_9_5-CVE-2015-5477.patch b/meta/recipes-connectivity/bind/bind/bind9_9_5-CVE-2015-5477.patch
> new file mode 100644
> index 0000000..896272a
> --- /dev/null
> +++ b/meta/recipes-connectivity/bind/bind/bind9_9_5-CVE-2015-5477.patch
> @@ -0,0 +1,45 @@
> +From dbb064aa7972ef918d9a235b713108a4846cbb62 Mon Sep 17 00:00:00 2001
> +From: Mark Andrews <marka@isc.org>
> +Date: Tue, 14 Jul 2015 14:48:42 +1000
> +Subject: [PATCH] 4165. [bug] An failure to reset a value to NULL
> + in tkey.c could result in an assertion failure.
> + (CVE-2015-5477) [RT #40046]
> +
> +Upstream-Status: Backport
> +[CHANGES file has been edited manually to add CVE-2015-5477 and
> +an already applied CVE (CVE-2014-8500)].
> +
> +Referenc: https://kb.isc.org/article/AA-01272
> +
> +Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
> +
> +diff -ruN a/CHANGES b/CHANGES
> +--- a/CHANGES 2014-01-27 19:58:24.000000000 +0100
> ++++ b/CHANGES 2015-07-30 11:03:18.871670769 +0200
> +@@ -1,4 +1,15 @@
> + --- 9.9.5 released ---
> ++4165. [security] An failure to reset a value to NULL in tkey.c could
> ++ result in an assertion failure. (CVE-2015-5477)
> ++ [RT #40046]
> ++
> ++4006. [security] A flaw in delegation handling could be exploited
> ++ to put named into an infinite loop. This has
> ++ been addressed by placing limits on the number
> ++ of levels of recursion named will allow (default 7),
> ++ and the number of iterative queries that it will
> ++ send (default 50) before terminating a recursive
> ++ query (CVE-2014-8500).
> +
> + --- 9.9.5rc2 released ---
> +
> +diff -ruN a/lib/dns/tkey.c b/lib/dns/tkey.c
> +--- a/lib/dns/tkey.c 2014-01-27 19:58:24.000000000 +0100
> ++++ b/lib/dns/tkey.c 2015-07-30 10:58:30.647945942 +0200
> +@@ -650,6 +650,7 @@
> + * Try the answer section, since that's where Win2000
> + * puts it.
> + */
> ++ name = NULL;
> + if (dns_message_findname(msg, DNS_SECTION_ANSWER, qname,
> + dns_rdatatype_tkey, 0, &name,
> + &tkeyset) != ISC_R_SUCCESS) {
> diff --git a/meta/recipes-connectivity/bind/bind_9.9.5.bb b/meta/recipes-connectivity/bind/bind_9.9.5.bb
> index 8e04f8a..e206cc4 100644
> --- a/meta/recipes-connectivity/bind/bind_9.9.5.bb
> +++ b/meta/recipes-connectivity/bind/bind_9.9.5.bb
> @@ -18,6 +18,7 @@ SRC_URI = "ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \
> file://bind9 \
> file://init.d-add-support-for-read-only-rootfs.patch \
> file://bind9_9_5-CVE-2014-8500.patch \
> + file://bind9_9_5-CVE-2015-5477.patch \
> "
>
> SRC_URI[md5sum] = "e676c65cad5234617ee22f48e328c24e"
prev parent reply other threads:[~2015-08-20 1:02 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-07-30 11:48 [dizzy][PATCH] bind9.9.5: CVE-2015-5477 Sona Sarmadi
2015-08-20 1:02 ` akuster808 [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=55D5272F.3050701@gmail.com \
--to=akuster808@gmail.com \
--cc=openembedded-core@lists.openembedded.org \
--cc=sona.sarmadi@enea.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.