Compare commits

...

12 Commits

Author SHA1 Message Date
Evan Hunt
df6718246c [v9_8_5_patch] assertion failure in resolver.c
3584.	[security]	Caching data from an incompletely signed zone could
			trigger an assertion failure in resolver.c [RT #33690]
(cherry picked from commit 276457f7a3)
2013-06-04 11:30:22 -07:00
Mark Andrews
7deb9091fc Merge branch 'v9_8' into v9_8_5_patch 2013-05-17 14:20:54 +10:00
Mark Andrews
787f32e50a Merge branch 'v9_8' into v9_8_5_patch 2013-04-05 13:39:06 +11:00
Mark Andrews
332b4f22d3 Merge branch 'v9_8' into v9_8_5_patch 2013-03-07 14:12:51 +11:00
Mark Andrews
aec1a70a63 add POST's 2013-01-17 23:26:04 +11:00
Mark Andrews
a439625fb0 s/head/tail/ 2013-01-17 21:45:46 +11:00
Mark Andrews
976117bfc0 Silence "Access to field 'refs' results in a dereference of a null pointer" 2013-01-17 15:26:28 +11:00
Mark Andrews
1cf1eab6ce Silence "Use of memory after it is freed" by asserting the head and tail of list are not the element after it is unlinked from the list. 2013-01-17 14:23:28 +11:00
Mark Andrews
fd06af6f48 silence compiler warning: Value stored to '?' is never used 2013-01-16 07:15:18 +11:00
Mark Andrews
d48716114f fix typo 2013-01-11 17:47:48 +11:00
Mark Andrews
346e72b591 add dns_zone_clearqueryaoncl, dns_zone_getqueryaoncl 2013-01-11 16:52:37 +11:00
Mark Andrews
859309b6a5 windows snprint support 2013-01-11 16:27:24 +11:00
3 changed files with 30 additions and 8 deletions

View File

@@ -1,3 +1,8 @@
--- 9.8.5-P1 released ---
3584. [security] Caching data from an incompletely signed zone could
trigger an assertion failure in resolver.c [RT #33690]
--- 9.8.5 released ---
3568. [cleanup] Add a product description line to the version file,

View File

@@ -4389,7 +4389,7 @@ fctx_log(void *arg, int level, const char *fmt, ...) {
static inline isc_result_t
findnoqname(fetchctx_t *fctx, dns_name_t *name, dns_rdatatype_t type,
dns_name_t **noqname)
dns_name_t **noqnamep)
{
dns_rdataset_t *nrdataset, *next, *sigrdataset;
dns_rdata_rrsig_t rrsig;
@@ -4402,10 +4402,12 @@ findnoqname(fetchctx_t *fctx, dns_name_t *name, dns_rdatatype_t type,
dns_fixedname_t fclosest;
dns_name_t *nearest;
dns_fixedname_t fnearest;
dns_rdatatype_t found = dns_rdatatype_none;
dns_name_t *noqname = NULL;
FCTXTRACE("findnoqname");
REQUIRE(noqname != NULL && *noqname == NULL);
REQUIRE(noqnamep != NULL && *noqnamep == NULL);
/*
* Find the SIG for this rdataset, if we have it.
@@ -4474,8 +4476,10 @@ findnoqname(fetchctx_t *fctx, dns_name_t *name, dns_rdatatype_t type,
&data, NULL, fctx_log,
fctx)))
{
if (!exists)
*noqname = nsec;
if (!exists) {
noqname = nsec;
found = dns_rdatatype_nsec;
}
}
if (nrdataset->type == dns_rdatatype_nsec3 &&
@@ -4488,13 +4492,26 @@ findnoqname(fetchctx_t *fctx, dns_name_t *name, dns_rdatatype_t type,
closest, nearest,
fctx_log, fctx)))
{
if (!exists && setnearest)
*noqname = nsec;
if (!exists && setnearest) {
noqname = nsec;
found = dns_rdatatype_nsec3;
}
}
}
}
if (result == ISC_R_NOMORE)
result = ISC_R_SUCCESS;
if (noqname != NULL) {
for (sigrdataset = ISC_LIST_HEAD(noqname->list);
sigrdataset != NULL;
sigrdataset = ISC_LIST_NEXT(sigrdataset, link)) {
if (sigrdataset->type == dns_rdatatype_rrsig &&
sigrdataset->covers == found)
break;
}
if (sigrdataset != NULL)
*noqnamep = noqname;
}
return (result);
}

View File

@@ -8,5 +8,5 @@ DESCRIPTION=
MAJORVER=9
MINORVER=8
PATCHVER=5
RELEASETYPE=
RELEASEVER=
RELEASETYPE=-P
RELEASEVER=1