diff options
author | Armin Kuster <akuster@mvista.com> | 2016-01-30 19:29:32 -0800 |
---|---|---|
committer | Saul Wold <sgw@linux.intel.com> | 2016-02-01 08:24:05 -0800 |
commit | 1656eaa722952861ec73362776bd0c4826aec3da (patch) | |
tree | e4d9870ffa5beace9e34095922af52865e150c37 | |
parent | a159f9dcf3806f2c3677775d6fb131dab17a5a17 (diff) | |
download | openembedded-core-1656eaa722952861ec73362776bd0c4826aec3da.tar.gz openembedded-core-1656eaa722952861ec73362776bd0c4826aec3da.tar.bz2 openembedded-core-1656eaa722952861ec73362776bd0c4826aec3da.zip |
bind: Security fix CVE-2015-8461
CVE-2015-8461 bind: race condition when handling socket errors can lead to an assertion failure in resolver.c\
Signed-off-by: Armin Kuster <akuster@mvista.com>
-rw-r--r-- | meta/recipes-connectivity/bind/bind/CVE-2015-8461.patch | 44 | ||||
-rw-r--r-- | meta/recipes-connectivity/bind/bind_9.10.2-P4.bb | 1 |
2 files changed, 45 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/bind/bind/CVE-2015-8461.patch b/meta/recipes-connectivity/bind/bind/CVE-2015-8461.patch new file mode 100644 index 0000000000..88e9c83421 --- /dev/null +++ b/meta/recipes-connectivity/bind/bind/CVE-2015-8461.patch @@ -0,0 +1,44 @@ +From adbf81335b67be0cebdcf9f1f4fcb38ef4814f4d Mon Sep 17 00:00:00 2001 +From: Mark Andrews <marka@isc.org> +Date: Thu, 25 Jun 2015 18:36:27 +1000 +Subject: [PATCH] 4146. [bug] Address reference leak that could + prevent a clean shutdown. [RT #37125] + +Upstream-Status: Backport + +https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git;a=commit;h=adbf81335b67be0cebdcf9f1f4fcb38ef4814f4d + +CVE: CVE-2015-8461 +Signed-off-by: Armin Kuster <akuster@mvista.com> +--- + CHANGES | 3 +++ + lib/dns/resolver.c | 5 +++++ + 2 files changed, 8 insertions(+) + +Index: bind-9.10.2-P4/CHANGES +=================================================================== +--- bind-9.10.2-P4.orig/CHANGES ++++ bind-9.10.2-P4/CHANGES +@@ -1,3 +1,6 @@ ++4146. [bug] Address reference leak that could prevent a clean ++ shutdown. [RT #37125] ++ + 4260. [security] Insufficient testing when parsing a message allowed + records with an incorrect class to be be accepted, + triggering a REQUIRE failure when those records +Index: bind-9.10.2-P4/lib/dns/resolver.c +=================================================================== +--- bind-9.10.2-P4.orig/lib/dns/resolver.c ++++ bind-9.10.2-P4/lib/dns/resolver.c +@@ -1649,6 +1649,11 @@ fctx_query(fetchctx_t *fctx, dns_adbaddr + if (query->dispatch != NULL) + dns_dispatch_detach(&query->dispatch); + ++ LOCK(&res->buckets[fctx->bucketnum].lock); ++ INSIST(fctx->references > 1); ++ fctx->references--; ++ UNLOCK(&res->buckets[fctx->bucketnum].lock); ++ + cleanup_query: + if (query->connects == 0) { + query->magic = 0; diff --git a/meta/recipes-connectivity/bind/bind_9.10.2-P4.bb b/meta/recipes-connectivity/bind/bind_9.10.2-P4.bb index b22dbf3a1a..19f87d7934 100644 --- a/meta/recipes-connectivity/bind/bind_9.10.2-P4.bb +++ b/meta/recipes-connectivity/bind/bind_9.10.2-P4.bb @@ -24,6 +24,7 @@ SRC_URI = "ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \ file://CVE-2015-8704.patch \ file://CVE-2015-8705.patch \ file://CVE-2015-8000.patch \ + file://CVE-2015-8461.patch \ " SRC_URI[md5sum] = "8b1f5064837756c938eadc1537dec5c7" |