deps: Update dependency dnsjava:dnsjava to v3.6.0 [SECURITY]#2203
Merged
kgala2 merged 1 commit intoGoogleCloudPlatform:mainfrom Oct 8, 2025
Merged
Conversation
Collaborator
|
/gcbrun |
d7a16d2 to
d3cfa9b
Compare
Collaborator
|
/gcbrun |
d3cfa9b to
5931bba
Compare
Collaborator
|
/gcbrun |
5931bba to
9c2a758
Compare
Collaborator
|
/gcbrun |
9c2a758 to
ba2ba3a
Compare
Collaborator
|
/gcbrun |
kgala2
approved these changes
Oct 8, 2025
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
3.2.2->3.6.0GitHub Vulnerability Alerts
CVE-2024-25638
Summary
Records in DNS replies are not checked for their relevance to the query, allowing an attacker to respond with RRs from different zones.
Details
DNS Messages are not authenticated. They do not guarantee that
Applications utilizing DNSSEC generally expect these guarantees to be met, however DNSSEC by itself only guarantees the first two.
To meet the third guarantee, resolvers generally follow an (undocumented, as far as RFCs go) algorithm such as: (simplified, e.g. lacks DNSSEC validation!)
QNAMEthe name you are querying (e.g. fraunhofer.de.), and initialize a list of aliasesQNAME, return it (and optionally return the list of aliases as well)QNAME, add it to the list of aliases. SetQNAMEto the CNAME's target and go to 2.QNAMEdoes not have any PTR, CNAME and DNAME records using valid NSEC or NSEC3 records. Returnnull.Note that this algorithm relies on NSEC records and thus requires a considerable portion of the DNSSEC specifications to be implemented. For this reason, it cannot be performed by a DNS client (aka application) and is typically performed as part of the resolver logic.
dnsjava does not implement a comparable algorithm, and the provided APIs instead return either
If applications blindly filter the received results for RRs of the desired record type (as seems to be typical usage for dnsjava), a rogue recursive resolver or (on UDP/TCP connections) a network attacker can
Impact
DNS(SEC) libraries are usually used as part of a larger security framework.
Therefore, the main misuses of this vulnerability concern application code, which might take the returned records as authentic answers to the request.
Here are three concrete examples of where this might be detrimental:
Mitigations
At this point, the following mitigations are recommended:
LookupSession.lookupAsync.Release Notes
dnsjava/dnsjava (dnsjava:dnsjava)
v3.6.0Compare Source
Lookup and LookupSession do not sanitize input properly, allowing to smuggle additional responses, even with DNSSEC. I would like to thank Thomas Bellebaum from Fraunhofer AISEC (@bellebaum) and Martin Schanzenbach (@schanzen) for reporting and assisting me with this issue.
Denial-of-Service Algorithmic Complexity Attacks (KeyTrap)
NSEC3 closest encloser proof can exhaust CPU resources (KeyTrap)
(@chrisruffalo, #253)
(#305, based on work from @srijeet0406 in #306)
v3.5.3Compare Source
v3.5.2Compare Source
v3.5.1Compare Source
v3.5.0Compare Source
Note that the license changed! Previous versions were BSD-2-Clause licensed, while from this release on it is BSD-3-Clause.
v3.4.3Compare Source
v3.4.2Compare Source
v3.4.1Compare Source
ED25519and ED448 algorithms(#200, Klaus Malorny)
(#202, @adam-stoler)
(#205, @adam-stoler)
v3.4.0Compare Source
(#177, @li-wjohnson)
(#179, @paulo-raca)
(#184, @ryru)
(#191, @amitknx)
v3.3.1Compare Source
(#135, @adam-stoler)
v3.3.0Compare Source
TypeNote that this resolver is more a proof of concept and not
production ready. See Javadoc and issue #123.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.