Skip to content

deps: Update dependency dnsjava:dnsjava to v3.6.0 [SECURITY]#2203

Merged
kgala2 merged 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/maven-dnsjava-dnsjava-vulnerability
Oct 8, 2025
Merged

deps: Update dependency dnsjava:dnsjava to v3.6.0 [SECURITY]#2203
kgala2 merged 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot:renovate/maven-dnsjava-dnsjava-vulnerability

Conversation

@renovate-bot
Copy link
Contributor

This PR contains the following updates:

Package Change Age Confidence
dnsjava:dnsjava 3.2.2 -> 3.6.0 age confidence

GitHub Vulnerability Alerts

CVE-2024-25638

Summary

Records in DNS replies are not checked for their relevance to the query, allowing an attacker to respond with RRs from different zones.

Details

DNS Messages are not authenticated. They do not guarantee that

  • received RRs are authentic
  • not received RRs do not exist
  • all or any received records in a response relate to the request

Applications utilizing DNSSEC generally expect these guarantees to be met, however DNSSEC by itself only guarantees the first two.
To meet the third guarantee, resolvers generally follow an (undocumented, as far as RFCs go) algorithm such as: (simplified, e.g. lacks DNSSEC validation!)

  1. denote by QNAME the name you are querying (e.g. fraunhofer.de.), and initialize a list of aliases
  2. if the ANSWER section contains a valid PTR RRSet for QNAME, return it (and optionally return the list of aliases as well)
  3. if the ANSWER section contains a valid CNAME RRSet for QNAME, add it to the list of aliases. Set QNAME to the CNAME's target and go to 2.
  4. Verify that QNAME does not have any PTR, CNAME and DNAME records using valid NSEC or NSEC3 records. Return null.

Note that this algorithm relies on NSEC records and thus requires a considerable portion of the DNSSEC specifications to be implemented. For this reason, it cannot be performed by a DNS client (aka application) and is typically performed as part of the resolver logic.

dnsjava does not implement a comparable algorithm, and the provided APIs instead return either

  • the received DNS message itself (e.g. when using a ValidatingResolver such as in this example), or
  • essentially just the contents of its ANSWER section (e.g. when using a LookupSession such as in this example)

If applications blindly filter the received results for RRs of the desired record type (as seems to be typical usage for dnsjava), a rogue recursive resolver or (on UDP/TCP connections) a network attacker can

  • In addition to the actual DNS response, add RRs irrelevant to the query but of the right datatype, e.g. from another zone, as long as that zone is correctly using DNSSEC, or
  • completely exchange the relevant response records

Impact

DNS(SEC) libraries are usually used as part of a larger security framework.
Therefore, the main misuses of this vulnerability concern application code, which might take the returned records as authentic answers to the request.
Here are three concrete examples of where this might be detrimental:

  • RFC 6186 specifies that to connect to an IMAP server for a user, a mail user agent should retrieve certain SRV records and send the user's credentials to the specified servers. Exchanging the SRV records can be a tool to redirect the credentials.
  • When delivering mail via SMTP, MX records determine where to deliver the mails to. Exchanging the MX records might lead to information disclosure. Additionally, an exchange of TLSA records might allow attackers to intercept TLS traffic.
  • Some research projects like LIGHTest are trying to manage CA trust stores via URI and SMIMEA records in the DNS. Exchanging these allows manipulating the root of trust for dependent applications.

Mitigations

At this point, the following mitigations are recommended:

  • When using a ValidatingResolver, ignore any Server indications of whether or not data was available (e.g. NXDOMAIN, NODATA, ...).
  • For APIs returning RRs from DNS responses, filter the RRs using an algorithm such as the one above. This includes e.g. LookupSession.lookupAsync.
  • Remove APIs dealing with raw DNS messages from the examples section or place a noticable warning above.

Release Notes

dnsjava/dnsjava (dnsjava:dnsjava)

v3.6.0

Compare Source

  • Fix CVE-2024-25638 (GHSA-cfxw-4h78-h7fw)
    Lookup and LookupSession do not sanitize input properly, allowing to smuggle additional responses, even with DNSSEC. I would like to thank Thomas Bellebaum from Fraunhofer AISEC (@​bellebaum) and Martin Schanzenbach (@​schanzen) for reporting and assisting me with this issue.
  • Fix CVE-2023-50387 (GHSA-crjg-w57m-rqqf)
    Denial-of-Service Algorithmic Complexity Attacks (KeyTrap)
  • Fix CVE-2023-50868 (GHSA-mmwx-rj87-vfgr)
    NSEC3 closest encloser proof can exhaust CPU resources (KeyTrap)
  • Fix running all DNSSEC on the specified executor
  • Add new DNSSEC algorithm constants for SM2SM3 and ECC-GOST12
  • Add A/AAAA record constructor with IP address byte array
  • Validate DS record digest lengths (#​250)
  • Fix NPE in SimpleResolver on invalid responses (#​277)
  • Add support for JEP 418: Internet-Address Resolution SPI (#​290)
  • Full JPMS support (#​246)
  • Pluggable I/O for SimpleResolver
    (@​chrisruffalo, #​253)
  • UDP port leak in SimpleResolver (#​318)
  • Fix clean shutdown in app containers when never used (#​319)
  • Fix concurrency issue in I/O clients (#​315, #​323)
  • LookupSession doesn't cache CNAMEs (#​316)
  • SimpleResolver can fail with UPDATE response (#​322)
  • Replace synchronization in Zone with locks
    (#​305, based on work from @​srijeet0406 in #​306)

v3.5.3

Compare Source

  • Fix CNAME in LookupSession (#​279)
  • Fix Name constructor failing with max length, relative name and root origin (#​289, @​MMauro94)
  • Add config option for Resolver I/O timeout (#​273, @​vmarian2)
  • Extend I/O logging
  • Prevent exception during TCP I/O with missing or truncated length prefix
  • Use internal base64 codec for Android compatibility (#​271)
  • Fix multi-message TSIG stream verification for pre-RFC8945 servers (#​295, @​frankarinnet and @​nguichon)
  • Add StreamGenerator for generating RFC8945 compliant multi-message streams (related to #​295)

v3.5.2

Compare Source

  • Correctly render empty TXT records (#​254)
  • More validation on TLSA data input (#​257)

v3.5.1

Compare Source

  • Fix validation of TSIG signed responses (#​249)
  • DS rdata digest validation hexadecimal digits (#​252)

v3.5.0

Compare Source

Note that the license changed! Previous versions were BSD-2-Clause licensed, while from this release on it is BSD-3-Clause.

v3.4.3

Compare Source

v3.4.2

Compare Source

  • Document behavior of ExtendedResolver.setTimeout (#​206)
  • Add overloads to use an Executor when sending queries in resolvers (#​211)
  • Remove synchronous locks in DoH Resolver (related to #​211)
  • Fix broken CNAME handling in LookupSession (#​212)
  • "WireParseException: bad label type" when parsing Message from ByteBuffer (#​213)
  • Remove unnecessary synchronization in org.xbill.DNS.Header::getID (#​215, @​maltalex)
  • Add examples for the LookupSession and direct Resolver usage

v3.4.1

Compare Source

v3.4.0

Compare Source

v3.3.1

Compare Source

v3.3.0

Compare Source

  • Add support for SVCB and HTTPS records (PR #​116, @​adam-stoler)
  • Fix an issue with ndots in Lookup (#​118)
  • Support IPv4 mapped IPv6 address in AAAA record (PR #​120, @​spwei)
  • Validate range in Type
  • Improve DOH Resolver (#​123, #​127)
    Note that this resolver is more a proof of concept and not
    production ready. See Javadoc and issue #​123.

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate-bot renovate-bot requested a review from a team as a code owner September 10, 2025 22:53
@dpebot
Copy link
Collaborator

dpebot commented Sep 10, 2025

/gcbrun

@renovate-bot renovate-bot force-pushed the renovate/maven-dnsjava-dnsjava-vulnerability branch from d7a16d2 to d3cfa9b Compare September 18, 2025 17:54
@dpebot
Copy link
Collaborator

dpebot commented Sep 18, 2025

/gcbrun

@renovate-bot renovate-bot force-pushed the renovate/maven-dnsjava-dnsjava-vulnerability branch from d3cfa9b to 5931bba Compare September 18, 2025 22:27
@dpebot
Copy link
Collaborator

dpebot commented Sep 18, 2025

/gcbrun

@renovate-bot renovate-bot force-pushed the renovate/maven-dnsjava-dnsjava-vulnerability branch from 5931bba to 9c2a758 Compare September 29, 2025 21:31
@dpebot
Copy link
Collaborator

dpebot commented Sep 29, 2025

/gcbrun

@renovate-bot renovate-bot force-pushed the renovate/maven-dnsjava-dnsjava-vulnerability branch from 9c2a758 to ba2ba3a Compare September 29, 2025 22:28
@dpebot
Copy link
Collaborator

dpebot commented Sep 29, 2025

/gcbrun

@kgala2 kgala2 merged commit 4008552 into GoogleCloudPlatform:main Oct 8, 2025
21 checks passed
@renovate-bot renovate-bot deleted the renovate/maven-dnsjava-dnsjava-vulnerability branch October 8, 2025 20:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants

Comments