From a2bc50f814b6966b412ba90221460066a8b31951 Mon Sep 17 00:00:00 2001 From: Xin LI Date: Wed, 18 Feb 2015 22:18:49 +0000 Subject: Apply vendor patch for CVE-2015-1349. --- CHANGES | 7 +++++++ lib/dns/zone.c | 8 +++++++- 2 files changed, 14 insertions(+), 1 deletion(-) diff --git a/CHANGES b/CHANGES index e8d75ea9d348..b45be6dabc69 100644 --- a/CHANGES +++ b/CHANGES @@ -1,3 +1,10 @@ + --- 9.9.6-P2 released --- + +4053. [security] Revoking a managed trust anchor and supplying + an untrusted replacement could cause named + to crash with an assertion failure. + (CVE-2015-1349) [RT #38344] + --- 9.9.6-P1 released --- 4006. [security] A flaw in delegation handling could be exploited diff --git a/lib/dns/zone.c b/lib/dns/zone.c index 7a9825bd96b0..5db28449b8f7 100644 --- a/lib/dns/zone.c +++ b/lib/dns/zone.c @@ -8508,6 +8508,12 @@ keyfetch_done(isc_task_t *task, isc_event_t *event) { namebuf, tag); trustkey = ISC_TRUE; } + } else { + /* + * No previously known key, and the key is not + * secure, so skip it. + */ + continue; } /* Delete old version */ @@ -8556,7 +8562,7 @@ keyfetch_done(isc_task_t *task, isc_event_t *event) { trust_key(zone, keyname, &dnskey, mctx); } - if (!deletekey) { + if (secure && !deletekey) { INSIST(newkey || updatekey); set_refreshkeytimer(zone, &keydata, now); } -- cgit v1.2.3