zahori-io / zahori-framework

Library containing Zahori Test Framework for Zahori.io
GNU Affero General Public License v3.0
0 stars 6 forks source link

Update dependency dnsjava:dnsjava to v3.6.0 [SECURITY] #265

Open renovate[bot] opened 1 month ago

renovate[bot] commented 1 month ago

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
dnsjava:dnsjava 3.5.3 -> 3.6.0 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2024-25638

Summary

Records in DNS replies are not checked for their relevance to the query, allowing an attacker to respond with RRs from different zones.

Details

DNS Messages are not authenticated. They do not guarantee that

Applications utilizing DNSSEC generally expect these guarantees to be met, however DNSSEC by itself only guarantees the first two. To meet the third guarantee, resolvers generally follow an (undocumented, as far as RFCs go) algorithm such as: (simplified, e.g. lacks DNSSEC validation!)

  1. denote by QNAME the name you are querying (e.g. fraunhofer.de.), and initialize a list of aliases
  2. if the ANSWER section contains a valid PTR RRSet for QNAME, return it (and optionally return the list of aliases as well)
  3. if the ANSWER section contains a valid CNAME RRSet for QNAME, add it to the list of aliases. Set QNAME to the CNAME's target and go to 2.
  4. Verify that QNAME does not have any PTR, CNAME and DNAME records using valid NSEC or NSEC3 records. Return null.

Note that this algorithm relies on NSEC records and thus requires a considerable portion of the DNSSEC specifications to be implemented. For this reason, it cannot be performed by a DNS client (aka application) and is typically performed as part of the resolver logic.

dnsjava does not implement a comparable algorithm, and the provided APIs instead return either

If applications blindly filter the received results for RRs of the desired record type (as seems to be typical usage for dnsjava), a rogue recursive resolver or (on UDP/TCP connections) a network attacker can

Impact

DNS(SEC) libraries are usually used as part of a larger security framework. Therefore, the main misuses of this vulnerability concern application code, which might take the returned records as authentic answers to the request. Here are three concrete examples of where this might be detrimental:

Mitigations

At this point, the following mitigations are recommended:

GHSA-mmwx-rj87-vfgr

Impact

Users using the ValidatingResolver for DNSSEC validation can run into CPU exhaustion with specially crafted DNSSEC-signed zones.

Patches

Users should upgrade to dnsjava v3.6.0

Workarounds

Although not recommended, only using a non-validating resolver, will remove the vulnerability.

References

https://www.athene-center.de/en/keytrap

GHSA-crjg-w57m-rqqf

Impact

Users using the ValidatingResolver for DNSSEC validation can run into CPU exhaustion with specially crafted DNSSEC-signed zones.

Patches

Users should upgrade to dnsjava v3.6.0

Workarounds

Although not recommended, only using a non-validating resolver, will remove the vulnerability.

References

https://www.athene-center.de/en/keytrap


Release Notes

dnsjava/dnsjava (dnsjava:dnsjava) ### [`v3.6.0`](https://redirect.github.com/dnsjava/dnsjava/releases/tag/v3.6.0) [Compare Source](https://redirect.github.com/dnsjava/dnsjava/compare/v3.5.3...v3.6.0) - Fix CVE-2024-25638 (GHSA-cfxw-4h78-h7fw) Lookup and LookupSession do not sanitize input properly, allowing to smuggle additional responses, even with DNSSEC. I would like to thank Thomas Bellebaum from Fraunhofer AISEC ([@​bellebaum](https://redirect.github.com/bellebaum)) and Martin Schanzenbach ([@​schanzen](https://redirect.github.com/schanzen)) for reporting and assisting me with this issue. - Fix CVE-2023-50387 (GHSA-crjg-w57m-rqqf) Denial-of-Service Algorithmic Complexity Attacks (KeyTrap) - Fix CVE-2023-50868 (GHSA-mmwx-rj87-vfgr) NSEC3 closest encloser proof can exhaust CPU resources (KeyTrap) - Fix running all DNSSEC on the specified executor - Add new DNSSEC algorithm constants for SM2SM3 and ECC-GOST12 - Add A/AAAA record constructor with IP address byte array - Validate DS record digest lengths ([#​250](https://redirect.github.com/dnsjava/dnsjava/issues/250)) - Fix NPE in SimpleResolver on invalid responses ([#​277](https://redirect.github.com/dnsjava/dnsjava/issues/277)) - Add support for JEP 418: Internet-Address Resolution SPI ([#​290](https://redirect.github.com/dnsjava/dnsjava/issues/290)) - Full JPMS support ([#​246](https://redirect.github.com/dnsjava/dnsjava/issues/246)) - Pluggable I/O for SimpleResolver ([@​chrisruffalo](https://redirect.github.com/chrisruffalo), [#​253](https://redirect.github.com/dnsjava/dnsjava/issues/253)) - UDP port leak in SimpleResolver ([#​318](https://redirect.github.com/dnsjava/dnsjava/issues/318)) - Fix clean shutdown in app containers when never used ([#​319](https://redirect.github.com/dnsjava/dnsjava/issues/319)) - Fix concurrency issue in I/O clients ([#​315](https://redirect.github.com/dnsjava/dnsjava/issues/315), [#​323](https://redirect.github.com/dnsjava/dnsjava/issues/323)) - LookupSession doesn't cache CNAMEs ([#​316](https://redirect.github.com/dnsjava/dnsjava/issues/316)) - SimpleResolver can fail with UPDATE response ([#​322](https://redirect.github.com/dnsjava/dnsjava/issues/322)) - Replace synchronization in Zone with locks ([#​305](https://redirect.github.com/dnsjava/dnsjava/issues/305), based on work from [@​srijeet0406](https://redirect.github.com/srijeet0406) in [#​306](https://redirect.github.com/dnsjava/dnsjava/issues/306))

Configuration

šŸ“… Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

šŸš¦ Automerge: Disabled by config. Please merge this manually once you are satisfied.

ā™» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

šŸ”• Ignore: Close this PR and you won't be reminded about this update again.



This PR was generated by Mend Renovate. View the repository job log.

sonarcloud[bot] commented 1 month ago

Quality Gate Passed Quality Gate passed

Issues
0 New issues
0 Accepted issues

Measures
0 Security Hotspots
0.0% Coverage on New Code
0.0% Duplication on New Code

See analysis details on SonarCloud