summaryrefslogtreecommitdiff
path: root/CHANGELOG
diff options
context:
space:
mode:
authorSeonah Moon <seonah1.moon@samsung.com>2021-01-27 20:12:33 +0900
committerSeonah Moon <seonah1.moon@samsung.com>2021-01-27 20:19:26 +0900
commit9a9940fac7c8116d02571a84692e25396a4cfcfc (patch)
tree067040a4aeebf5642c6a8b1e0ad14feee80a1c46 /CHANGELOG
parent09d50377ce7e37f2719227f03687b5286d9a82a5 (diff)
parent219639ccc0b123b3770c799a8f050bce7836378e (diff)
downloaddnsmasq-tizen_6.5.tar.gz
dnsmasq-tizen_6.5.tar.bz2
dnsmasq-tizen_6.5.zip
Change-Id: Ib59076a278201769b7b309fc0aa320804c60bbbe
Diffstat (limited to 'CHANGELOG')
-rw-r--r--CHANGELOG34
1 files changed, 34 insertions, 0 deletions
diff --git a/CHANGELOG b/CHANGELOG
index e6a2231..b70bf26 100644
--- a/CHANGELOG
+++ b/CHANGELOG
@@ -1,3 +1,37 @@
+version 2.83
+ Use the values of --min-port and --max-port in outgoing
+ TCP connections to upstream DNS servers.
+
+ Fix a remote buffer overflow problem in the DNSSEC code. Any
+ dnsmasq with DNSSEC compiled in and enabled is vulnerable to this,
+ referenced by CVE-2020-25681, CVE-2020-25682, CVE-2020-25683
+ CVE-2020-25687.
+
+ Be sure to only accept UDP DNS query replies at the address
+ from which the query was originated. This keeps as much entropy
+ in the {query-ID, random-port} tuple as possible, to help defeat
+ cache poisoning attacks. Refer: CVE-2020-25684.
+
+ Use the SHA-256 hash function to verify that DNS answers
+ received are for the questions originally asked. This replaces
+ the slightly insecure SHA-1 (when compiled with DNSSEC) or
+ the very insecure CRC32 (otherwise). Refer: CVE-2020-25685.
+
+ Handle multiple identical near simultaneous DNS queries better.
+ Previously, such queries would all be forwarded
+ independently. This is, in theory, inefficent but in practise
+ not a problem, _except_ that is means that an answer for any
+ of the forwarded queries will be accepted and cached.
+ An attacker can send a query multiple times, and for each repeat,
+ another {port, ID} becomes capable of accepting the answer he is
+ sending in the blind, to random IDs and ports. The chance of a
+ succesful attack is therefore multiplied by the number of repeats
+ of the query. The new behaviour detects repeated queries and
+ merely stores the clients sending repeats so that when the
+ first query completes, the answer can be sent to all the
+ clients who asked. Refer: CVE-2020-25686.
+
+
version 2.82
Improve behaviour in the face of network interfaces which come
and go and change index. Thanks to Petr Mensik for the patch.