import bind-9.11.26-6.el8
This commit is contained in:
parent
7ea3346926
commit
0f18d3fb97
44
SOURCES/bind-9.11-CVE-2021-25214.patch
Normal file
44
SOURCES/bind-9.11-CVE-2021-25214.patch
Normal file
@ -0,0 +1,44 @@
|
||||
From 4eff09c6b1e524b0efc393ee948b5c4cdf16ccb8 Mon Sep 17 00:00:00 2001
|
||||
From: Mark Andrews <marka@isc.org>
|
||||
Date: Wed, 3 Feb 2021 11:10:20 +1100
|
||||
Subject: [PATCH] Check SOA owner names in zone transfers
|
||||
|
||||
An IXFR containing SOA records with owner names different than the
|
||||
transferred zone's origin can result in named serving a version of that
|
||||
zone without an SOA record at the apex. This causes a RUNTIME_CHECK
|
||||
assertion failure the next time such a zone is refreshed. Fix by
|
||||
immediately rejecting a zone transfer (either an incremental or
|
||||
non-incremental one) upon detecting an SOA record not placed at the apex
|
||||
of the transferred zone.
|
||||
---
|
||||
lib/dns/xfrin.c | 14 ++++++++++++++
|
||||
1 file changed, 14 insertions(+)
|
||||
|
||||
diff --git a/lib/dns/xfrin.c b/lib/dns/xfrin.c
|
||||
index 3a3f407289..0ba82e4974 100644
|
||||
--- a/lib/dns/xfrin.c
|
||||
+++ b/lib/dns/xfrin.c
|
||||
@@ -477,6 +477,20 @@ xfr_rr(dns_xfrin_ctx_t *xfr, dns_name_t *name, uint32_t ttl,
|
||||
dns_rdatatype_ismeta(rdata->type))
|
||||
FAIL(DNS_R_FORMERR);
|
||||
|
||||
+ /*
|
||||
+ * Immediately reject the entire transfer if the RR that is currently
|
||||
+ * being processed is an SOA record that is not placed at the zone
|
||||
+ * apex.
|
||||
+ */
|
||||
+ if (rdata->type == dns_rdatatype_soa &&
|
||||
+ !dns_name_equal(&xfr->name, name)) {
|
||||
+ char namebuf[DNS_NAME_FORMATSIZE];
|
||||
+ dns_name_format(name, namebuf, sizeof(namebuf));
|
||||
+ xfrin_log(xfr, ISC_LOG_DEBUG(3), "SOA name mismatch: '%s'",
|
||||
+ namebuf);
|
||||
+ FAIL(DNS_R_NOTZONETOP);
|
||||
+ }
|
||||
+
|
||||
redo:
|
||||
switch (xfr->state) {
|
||||
case XFRST_SOAQUERY:
|
||||
--
|
||||
2.26.3
|
||||
|
38
SOURCES/bind-9.11-rh1935152.patch
Normal file
38
SOURCES/bind-9.11-rh1935152.patch
Normal file
@ -0,0 +1,38 @@
|
||||
From 4757898440d52b0adbf7ec7ee7f0f89b61aac0fb Mon Sep 17 00:00:00 2001
|
||||
From: Mark Andrews <marka@isc.org>
|
||||
Date: Fri, 18 Dec 2020 13:31:07 +1100
|
||||
Subject: [PATCH] Inactive incorrectly incremented
|
||||
|
||||
It is possible to have two threads destroying an rbtdb at the same
|
||||
time when detachnode() executes and removes the last reference to
|
||||
a node between exiting being set to true for the node and testing
|
||||
if the references are zero in maybe_free_rbtdb(). Move NODE_UNLOCK()
|
||||
to after checking if references is zero to prevent detachnode()
|
||||
changing the reference count too early.
|
||||
|
||||
(cherry picked from commit 859d2fdad6d1c6ff20083a4c463a929cbeb26438)
|
||||
(cherry picked from commit 25150c15e7cfa73289f04470e2e699ebb7c28fef)
|
||||
---
|
||||
lib/dns/rbtdb.c | 2 +-
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/lib/dns/rbtdb.c b/lib/dns/rbtdb.c
|
||||
index 8ea4d47..77ef7a4 100644
|
||||
--- a/lib/dns/rbtdb.c
|
||||
+++ b/lib/dns/rbtdb.c
|
||||
@@ -1460,11 +1460,11 @@ maybe_free_rbtdb(dns_rbtdb_t *rbtdb) {
|
||||
for (i = 0; i < rbtdb->node_lock_count; i++) {
|
||||
NODE_LOCK(&rbtdb->node_locks[i].lock, isc_rwlocktype_write);
|
||||
rbtdb->node_locks[i].exiting = true;
|
||||
- NODE_UNLOCK(&rbtdb->node_locks[i].lock, isc_rwlocktype_write);
|
||||
if (isc_refcount_current(&rbtdb->node_locks[i].references)
|
||||
== 0) {
|
||||
inactive++;
|
||||
}
|
||||
+ NODE_UNLOCK(&rbtdb->node_locks[i].lock, isc_rwlocktype_write);
|
||||
}
|
||||
|
||||
if (inactive != 0) {
|
||||
--
|
||||
2.26.3
|
||||
|
32
SOURCES/bind-9.11-rh1980757.patch
Normal file
32
SOURCES/bind-9.11-rh1980757.patch
Normal file
@ -0,0 +1,32 @@
|
||||
From a503519533eb375a5ce1f7566bfc153aac980d87 Mon Sep 17 00:00:00 2001
|
||||
From: Petr Mensik <pemensik@redhat.com>
|
||||
Date: Fri, 9 Jul 2021 20:52:21 +0200
|
||||
Subject: [PATCH] Use proper entropy to initialize tsig keyname
|
||||
|
||||
Random names used on GSS backed nsupdate can conflict in specific
|
||||
situations. That might include starting a lot of machines from
|
||||
containers, where they took all similar time to start. PID and timestamp
|
||||
would be similar and therefore randomness is quite low. Use entropy to
|
||||
generate more random identifier and reduce chance of conflict.
|
||||
---
|
||||
bin/nsupdate/nsupdate.c | 4 +++-
|
||||
1 file changed, 3 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/bin/nsupdate/nsupdate.c b/bin/nsupdate/nsupdate.c
|
||||
index 458aa76..d9e5a2b 100644
|
||||
--- a/bin/nsupdate/nsupdate.c
|
||||
+++ b/bin/nsupdate/nsupdate.c
|
||||
@@ -2941,7 +2941,9 @@ start_gssrequest(dns_name_t *master) {
|
||||
|
||||
keyname = dns_fixedname_initname(&fkname);
|
||||
|
||||
- isc_random_get(&val);
|
||||
+ result = isc_entropy_getdata(entropy, &val, sizeof(val), NULL, 0);
|
||||
+ if (result != ISC_R_SUCCESS)
|
||||
+ isc_random_get(&val);
|
||||
result = isc_string_printf(mykeystr, sizeof(mykeystr), "%u.sig-%s",
|
||||
val, namestr);
|
||||
if (result != ISC_R_SUCCESS)
|
||||
--
|
||||
2.31.1
|
||||
|
@ -68,7 +68,7 @@ Summary: The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) serv
|
||||
Name: bind
|
||||
License: MPLv2.0
|
||||
Version: 9.11.26
|
||||
Release: 4%{?PATCHVER:.%{PATCHVER}}%{?PREVER:.%{PREVER}}%{?dist}
|
||||
Release: 6%{?PATCHVER:.%{PATCHVER}}%{?PREVER:.%{PREVER}}%{?dist}
|
||||
Epoch: 32
|
||||
Url: https://www.isc.org/downloads/bind/
|
||||
#
|
||||
@ -156,6 +156,12 @@ Patch177:bind-9.11-serve-stale.patch
|
||||
Patch178:bind-9.11-dhcp-time-monotonic.patch
|
||||
Patch179:bind-9.11-CVE-2020-8625.patch
|
||||
Patch180:bind-9.11-CVE-2021-25215.patch
|
||||
# https://gitlab.isc.org/isc-projects/bind9/commit/dfadbc9d7b485b1af62d77ad6c309792bbaabfdf
|
||||
Patch181:bind-9.11-CVE-2021-25214.patch
|
||||
# https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/4533/diffs?commit_id=25150c15e7cfa73289f04470e2e699ebb7c28fef
|
||||
Patch182:bind-9.11-rh1935152.patch
|
||||
# https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/5253
|
||||
Patch183:bind-9.11-rh1980757.patch
|
||||
|
||||
# SDB patches
|
||||
Patch11: bind-9.3.2b2-sdbsrc.patch
|
||||
@ -552,6 +558,9 @@ are used for building ISC DHCP.
|
||||
%patch178 -p1 -b .time-monotonic
|
||||
%patch179 -p1 -b .CVE-2020-8625
|
||||
%patch180 -p1 -b .CVE-2021-25215
|
||||
%patch181 -p1 -b .CVE-2021-25214
|
||||
%patch182 -p1 -b .rh1935152
|
||||
%patch183 -p1 -b .rh1980757
|
||||
|
||||
mkdir lib/dns/tests/testdata/dstrandom
|
||||
cp -a %{SOURCE50} lib/dns/tests/testdata/dstrandom/random.data
|
||||
@ -1163,7 +1172,7 @@ fi
|
||||
%triggerin -- selinux-policy < 3.14.1-44
|
||||
# Failsafe for upgrades, set to new default
|
||||
if [ -x "%{_sbindir}/selinuxenabled" -a -x "%{_sbindir}/setsebool" ] && %{_sbindir}/selinuxenabled; then
|
||||
"%{_sbindir}/setsebool" -P named_write_master_zones=1
|
||||
"%{_sbindir}/setsebool" -P named_write_master_zones=1
|
||||
fi
|
||||
%end
|
||||
|
||||
@ -1603,8 +1612,16 @@ rm -rf ${RPM_BUILD_ROOT}
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Fri Jul 09 2021 Petr Menšík <pemensik@redhat.com> - 32:9.11.26-6
|
||||
- Use random entropy to generate unique TKEY identifiers (#1980916)
|
||||
|
||||
* Fri May 07 2021 Petr Menšík <pemensik@redhat.com> - 32:9.11.26-5
|
||||
- Fix possible assertion failure isc_refcount_current == 0 in free_rbtdb
|
||||
(#1953056)
|
||||
|
||||
* Tue Apr 27 2021 Petr Menšík <pemensik@redhat.com> - 32:9.11.26-4
|
||||
- Possible assertion failure on DNAME processing (CVE-2021-25215)
|
||||
- Insufficient IXFR checks could lead to assertion failure (CVE-2021-25214)
|
||||
|
||||
* Mon Feb 15 2021 Petr Menšík <pemensik@redhat.com> - 32:9.11.26-3
|
||||
- Fix off-by-one bug in ISC SPNEGO implementation (CVE-2020-8625)
|
||||
|
Loading…
Reference in New Issue
Block a user