Debian Patches

Status for maradns/2.0.13-1.6

Patch Description Author Forwarded Bugs Origin Last update
update_mararc_manpage.patch update mararc manpage to include maradns_user token Needed to be concise with patches we make. Dariusz Dwornikowski <dariusz.dwornikowski@cs.put.poznan.pl> not-needed 2014-03-07
makefile.patch Stop makefiles from overwriting themselves Upstream uses an unconventional makefile strategy in which
makefiles copy makefiles (and one header) around to cater for
compatibility. This patch overrides build/Makefile.linux to
stop that, and replicates the effects of the upstream code
by patching some Makefiles to the same effect.
The debian/rules also plays its part by backing and restoring
the header file and by explcitly mentioning Makefiles as required.
Nicholas Bamber <nicholas@periapt.co.uk> not-needed 2011-09-09
spelling.patch Spelling errors Nicholas Bamber <nicholas@periapt.co.uk> invalid 2011-09-09
groff.patch Fix error in the man pages This is really ugly. The man pages are generated by a custom text processing
system from filesin the doc/en/source directory. Therefore really this
needs to be fixed in the upstream 'ej' utility. It would be better to patch
that and submit that patch upstream.
Nicholas Bamber <nicholas@periapt.co.uk> no 2015-10-03
debian.patch Documentation needs to be updated to reflect Debian changes - bind2csv2.py changed to bind2csv2 Nicholas Bamber <nicholas@periapt.co.uk> not-needed 2011-09-09
duende_getopt.patch convert to argp and add extra arguments and resulting bug fixesNew args
--ident identity of the log helper process in syslog
--pid pid file of the duende daemon
--uid uid of the log helper process, defaults to 66
--chroot directory of the log helper chroot, defaults to /etc/maradns/logger
--gid gid of the log helper process, defaults to 66
--restart_on_exit exit status, defaults to 8
Changed functionality
Log helper chroots
Nicholas Bamber <nichoolas@periapt.co.uk> invalid 2011-09-15
duende_man.patch Duende man page We have made various changes to the duende executable and these need to
be reflected in the Debian man page.
Nicholas Bamber <nicholas@periapt.co.uk> invalid 2011-07-18
deadwood_makefile.patch deadwood source code corrupted during build Also we don't like binaries with a capital in the name. Nicholas Bamber <nicholas@periapt.co.uk> not-needed 2015-10-03
askmara-tcp.patch askmara-tcp lazily copies askmara usage and man page Nicholas Bamber <nicholas@periapt.co.uk> no
config_pollution.patch Should not pollute /etc namespace Moved all deadwood config files below /etc/maradns/deadwood Nicholas Bamber <nicholas@periapt.co.uk> not-needed 2015-10-03
ipv6.patch Build with IPV6 support Nicholas Bamber <nicholas@periapt.co.uk> not-needed 2011-12-22
maradns-harden.patch enabling hardened build flags Moritz Muehlenhoff <jmm@debian.org> not-needed 2015-10-03
hurd.patch MAXPATHLEN not defined on hurd Nicholas Bamber <nicholas@periapt.co.uk> not-needed 2012-02-06
randprime_prng.patch If /dev/urandom is not there, use PRNG number Tobias Frost <tobi@frost.de> not-needed 2015-10-03
maradns_user_config.patch Adding maradns_user to mararc Simon Burnet no 2014-03-04
bind2csv2-py3.patch Upstream fixes to make bind2csv2.py compatible with Python 3 Adrian Bunk <bunk@debian.org> no debian
bind2csv2-use-py3.patch bind2csv2.py: Use Python 3 Adrian Bunk <bunk@debian.org> no debian
0016-CVE-2023-31137-Integer-Underflow-Wrap-or-Wraparound.patch CVE-2023-31137 Integer Underflow (Wrap or Wraparound)
Fix long standing issue in this code from 2002

A remotely exploitable integer underflow vulnerability in the DNS packet decompression
function allows an attacker to cause a Denial of Service by triggering an abnormal
program termination.

The vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file.
When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass,
if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886`
is a negative number `len = rdlength - total;`.

This value is then passed to the `decomp_append_bytes` function without proper validation,
causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate.

Consequently, the program exits with an error code of 64, causing a Denial of Service
Sam Trenholme <git@samiam.org> no debian https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58.patch 2023-05-02
0017-1-2-CVE-2022-30256-Operation-on-a-Resource-after-Exp.patch [1/2] CVE-2022-30256 Operation on a Resource after Expiration or Release

A revoked
domain name can still be resolvable for a long time, including expired
domains and taken-down malicious domains. The effects of an exploit
would be widespread and highly impactful, because the exploitation
conforms to de facto DNS specifications and operational practices, and
overcomes current mitigation patches for "Ghost" domain names.
=?utf-8?q?Bastien_Roucari=C3=A8s?= <rouca@debian.org> no debian https://raw.githubusercontent.com/samboy/MaraDNS/73af12e71890055f1728c1b7ccd900401f2fdf03/deadwood-github/update/3.4.03/deadwood-3.4.02-manylabel-TTL.patch 2023-06-18
0018-2-2-CVE-2022-30256-Operation-on-a-Resource-after-Exp.patch [2/2] CVE-2022-30256 Operation on a Resource after Expiration or Release

A revoked
domain name can still be resolvable for a long time, including expired
domains and taken-down malicious domains. The effects of an exploit
would be widespread and highly impactful, because the exploitation
conforms to de facto DNS specifications and operational practices, and
overcomes current mitigation patches for "Ghost" domain names.
=?utf-8?q?Bastien_Roucari=C3=A8s?= <rouca@debian.org> no debian https://raw.githubusercontent.com/samboy/MaraDNS/73af12e71890055f1728c1b7ccd900401f2fdf03/deadwood-github/update/3.4.03/deadwood-3.4.02-cname-TTL.patch 2023-06-18

All known versions for source package 'maradns'

Links