summaryrefslogtreecommitdiff
path: root/bind-9.16-CVE-2022-38178.patch
diff options
context:
space:
mode:
Diffstat (limited to 'bind-9.16-CVE-2022-38178.patch')
-rw-r--r--bind-9.16-CVE-2022-38178.patch32
1 files changed, 32 insertions, 0 deletions
diff --git a/bind-9.16-CVE-2022-38178.patch b/bind-9.16-CVE-2022-38178.patch
new file mode 100644
index 0000000..fecd526
--- /dev/null
+++ b/bind-9.16-CVE-2022-38178.patch
@@ -0,0 +1,32 @@
+From 132ef295b8407f91e6922f4dfc4f30f1790b61c5 Mon Sep 17 00:00:00 2001
+From: Petr Mensik <pemensik@redhat.com>
+Date: Tue, 20 Sep 2022 11:22:47 +0200
+Subject: [PATCH 4/4] Fix CVE-2022-38178
+
+5962. [security] Fix memory leak in EdDSA verify processing.
+ (CVE-2022-38178) [GL #3487]
+---
+ lib/dns/openssleddsa_link.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/lib/dns/openssleddsa_link.c b/lib/dns/openssleddsa_link.c
+index 6a6a74d..3157011 100644
+--- a/lib/dns/openssleddsa_link.c
++++ b/lib/dns/openssleddsa_link.c
+@@ -234,11 +234,11 @@ openssleddsa_verify(dst_context_t *dctx, const isc_region_t *sig) {
+ }
+ #endif /* if HAVE_OPENSSL_ED448 */
+ if (siglen == 0) {
+- return (ISC_R_NOTIMPLEMENTED);
++ DST_RET(ISC_R_NOTIMPLEMENTED);
+ }
+
+ if (sig->length != siglen) {
+- return (DST_R_VERIFYFAILURE);
++ DST_RET(DST_R_VERIFYFAILURE);
+ }
+
+ isc_buffer_usedregion(buf, &tbsreg);
+--
+2.37.3
+