Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package dnsmasq for openSUSE:Factory checked 
in at 2021-01-20 18:23:34
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/dnsmasq (Old)
 and      /work/SRC/openSUSE:Factory/.dnsmasq.new.28504 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "dnsmasq"

Wed Jan 20 18:23:34 2021 rev:79 rq:864301 version:2.83

Changes:
--------
--- /work/SRC/openSUSE:Factory/dnsmasq/dnsmasq.changes  2020-08-03 
14:13:49.360405026 +0200
+++ /work/SRC/openSUSE:Factory/.dnsmasq.new.28504/dnsmasq.changes       
2021-01-20 18:24:07.839340056 +0100
@@ -1,0 +2,33 @@
+Tue Jan 19 12:24:02 UTC 2021 - Reinhard Max <m...@suse.com>
+
+- Update to 2.83:
+  * bsc#1177077: Fixed DNSpooq vulnerabilities
+  * Use the values of --min-port and --max-port in outgoing
+    TCP connections to upstream DNS servers.
+  * Fix a remote buffer overflow problem in the DNSSEC code.
+    Any dnsmasq with DNSSEC compiled in and enabled is vulnerable
+    to this, referenced by CVE-2020-25681, CVE-2020-25682,
+    CVE-2020-25683 CVE-2020-25687.
+  * Be sure to only accept UDP DNS query replies at the address
+    from which the query was originated. This keeps as much
+    entropy in the {query-ID, random-port} tuple as possible, to
+    help defeat cache poisoning attacks. Refer: CVE-2020-25684.
+  * Use the SHA-256 hash function to verify that DNS answers
+    received are for the questions originally asked. This replaces
+    the slightly insecure SHA-1 (when compiled with DNSSEC) or
+    the very insecure CRC32 (otherwise). Refer: CVE-2020-25685
+  * Handle multiple identical near simultaneous DNS queries better.
+    Previously, such queries would all be forwarded independently.
+    This is, in theory, inefficent but in practise not a problem,
+    _except_ that is means that an answer for any of the forwarded
+    queries will be accepted and cached.
+    An attacker can send a query multiple times, and for each
+    repeat, another {port, ID} becomes capable of accepting the
+    answer he is sending in the blind, to random IDs and ports.
+    The chance of a succesful attack is therefore multiplied by the
+    number of repeats of the query. The new behaviour detects
+    repeated queries and merely stores the clients sending repeats
+    so that when the first query completes, the answer can be sent
+    to all the clients who asked. Refer: CVE-2020-25686.
+
+-------------------------------------------------------------------

Old:
----
  dnsmasq-2.82.tar.xz
  dnsmasq-2.82.tar.xz.asc

New:
----
  dnsmasq-2.83.tar.xz
  dnsmasq-2.83.tar.xz.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dnsmasq.spec ++++++
--- /var/tmp/diff_new_pack.ehmvhU/_old  2021-01-20 18:24:08.851340804 +0100
+++ /var/tmp/diff_new_pack.ehmvhU/_new  2021-01-20 18:24:08.855340807 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package dnsmasq
 #
-# Copyright (c) 2020 SUSE LLC
+# Copyright (c) 2021 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -22,7 +22,7 @@
 %bcond_without tftp_user_package
 %endif
 Name:           dnsmasq
-Version:        2.82
+Version:        2.83
 Release:        0
 Summary:        DNS Forwarder and DHCP Server
 License:        GPL-2.0-only OR GPL-3.0-only

++++++ dnsmasq-2.82.tar.xz -> dnsmasq-2.83.tar.xz ++++++
++++ 2203 lines of diff (skipped)

Reply via email to