1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-11-29 01:13:08 +00:00
freebsd-ports/dns
Matthias Andree 8f4df0f8e6 MFH: r562154
dns/dnsmasq: security update to 2.83

CHANGELOG of version 2.83:

        Use the values of --min-port and --max-port in outgoing
        TCP connections to upstream DNS servers.

        Fix a remote buffer overflow problem in the DNSSEC code. Any
        dnsmasq with DNSSEC compiled in and enabled is vulnerable to this,
        referenced by CVE-2020-25681, CVE-2020-25682, CVE-2020-25683
        CVE-2020-25687.

        Be sure to only accept UDP DNS query replies at the address
        from which the query was originated. This keeps as much entropy
        in the {query-ID, random-port} tuple as possible, to help defeat
        cache poisoning attacks. Refer: CVE-2020-25684.

        Use the SHA-256 hash function to verify that DNS answers
        received are for the questions originally asked. This replaces
        the slightly insecure SHA-1 (when compiled with DNSSEC) or
        the very insecure CRC32 (otherwise). Refer: CVE-2020-25685.

        Handle multiple identical near simultaneous DNS queries better.
        Previously, such queries would all be forwarded
        independently. This is, in theory, inefficent but in practise
        not a problem, _except_ that is means that an answer for any
        of the forwarded queries will be accepted and cached.
        An attacker can send a query multiple times, and for each repeat,
        another {port, ID} becomes capable of accepting the answer he is
        sending in the blind, to random IDs and ports. The chance of a
        succesful attack is therefore multiplied by the number of repeats
        of the query. The new behaviour detects repeated queries and
        merely stores the clients sending repeats so that when the
        first query completes, the answer can be sent to all the
        clients who asked. Refer: CVE-2020-25686.
Security:	5b5cf6e5-5b51-11eb-95ac-7f9491278677
Security:	CVE-2020-25684
Security:	CVE-2020-25685
Security:	CVE-2020-25686
Security:	CVE-2020-25681
Security:	CVE-2020-25682
Security:	CVE-2020-25683
Security:	CVE-2020-25687
2021-01-20 19:21:04 +00:00
..
adns
adsuck
amass
ares
axfr2acl
bind9-devel
bind911
bind916
bind-tools
bindgraph
bundy
c-ares
checkdns
cli53
coredns
credns
crossip
curvedns
ddclient
ddns
denominator
dhisd
djbdns
djbdns-tools
dlint
dnrd
dns2blackhole
dns2tcp
dns_balance
dnsblast
dnscap
dnscheckengine
dnscontrol
dnscrypt-proxy2
dnscrypt-wrapper
dnsdbck
dnsdbq
dnsdist
dnsenum
dnsflood
dnsforwarder
dnshistory
dnsjava
dnsmasq
dnsmax-perl
dnsproxy
dnsrecon
dnsreflector
dnstable
dnstable-convert
dnstop
dnstracer
dnsutl
dnsviz
dnswalk
dnswall
doc
dog
doh-proxy
dq
drool
dsc
dsp
dynip
encrypted-dns-server
erlang-idna
fastresolve
firedns
flamethrower
fpdns
gdnsd2
gdnsd3
gen6dns
getdns
hesiod
hostdb
idnkit
idnkit2
inadyn
inadyn-mt
ipcheck
ironsides
kadnode
kf5-kdnssd
knock
knot2
knot3
knot3-lib
knot-resolver
ldapdns
ldns
libasr
libasr-devel
libbind
libdjbdns
libidn
libidn2
libmicrodns
libnspsl
libpsl
linux-c7-libasyncns
maradns
mdnsd
mDNSResponder_nss
mydns
mydns-ng
namesilo_ddns
nextdns
noip
nsd
nslint
nsnotifyd
nsping
nss_mdns
nss_resinit
opendd
opendnssec2
openresolv
p5-AnyEvent-CacheDNS
p5-AnyEvent-DNS-EtcHosts
p5-App-DSC-DataTool
p5-BIND-Conf_Parser
p5-BIND-Config-Parser
p5-Data-Validate-Domain
p5-DNS-Config
p5-DNS-EasyDNS
p5-DNS-Ldns
p5-DNS-Zone
p5-DNS-ZoneParse
p5-DSC
p5-IO-Async-Resolver-DNS
p5-Mozilla-PublicSuffix
p5-Net-Amazon-Route53
p5-Net-Bonjour
p5-Net-DNS
p5-Net-DNS-Async
p5-Net-DNS-Check
p5-Net-DNS-Codes
p5-Net-DNS-Lite
p5-Net-DNS-Match
p5-Net-DNS-Resolver-Mock
p5-Net-DNS-Resolver-Programmable
p5-Net-DNS-RR-SRV-Helper
p5-Net-DNS-SEC
p5-Net-DNS-TestNS
p5-Net-DNS-ToolKit
p5-Net-DNS-Zone-Parser
p5-Net-DNS-ZoneFile-Fast
p5-Net-DNSBL-MultiDaemon
p5-Net-DNSBL-Statistics
p5-Net-Domain-ExpireDate
p5-Net-Domain-TLD
p5-Net-DRI
p5-Net-LibIDN
p5-Net-LibIDN2
p5-Net-Nslookup
p5-Net-RBLClient
p5-Net-RNDC
p5-POE-Component-Client-DNS
p5-POE-Component-Client-DNS-Recursive
p5-POE-Component-Client-DNSBL
p5-POE-Component-Resolver
p5-POE-Component-Server-DNS
p5-POE-Filter-DNS-TCP
p5-Tie-DNS
p5-URBL-Prepare
packetq
pdnsd
pear-File_DNS
pear-Horde_Idna
pear-Net_DNS2
powerdns
powerdns-recursor
public_suffix_list
py-adns
py-aiodns
py-cloudflare
py-dns-lexicon
py-dnspython
py-dnspython2
py-easyzone
py-idna
py-idna_ssl
py-ldns
py-localzone
py-namebench
py-ns1-python
py-publicsuffix
py-publicsuffix2
py-publicsuffixlist
py-py3dns
py-pybonjour
py-pycares
py-pydnstable
py-pywdns
py-tld
py-tldextract
qmdnsengine
radns
rbldnsd
rbllookup
rbllookup-ng
rdap
renewck
rpsl2acl
rubygem-dnsruby
rubygem-gitlab-net-dns
rubygem-google-cloud-dns
rubygem-idn-ruby
rubygem-net-dns
rubygem-public_suffix
rubygem-public_suffix_service
rubygem-simpleidn
rubygem-validates_hostname
rubygem-zonefile
samba-nsupdate
scavenge
sheerdns
sleuth
subfinder
tinystats
totd
udns
unbound
updatedd
utdns
validns
vhostcname
vizone
void-zones-tools
walker
wdns
whoseip
wrapsrv
yadifa
zkt
zonenotify
Makefile