Debian Package Tracker
Register | Log in
Subscribe

maradns

Choose email to subscribe with

general
  • source: maradns (main)
  • version: 2.0.13-1.4+deb11u1
  • maintainer: Dariusz Dwornikowski (DMD)
  • arch: all any
  • std-ver: 3.9.6
  • VCS: Git (Browse)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.0.13-1.2
  • o-o-sec: 2.0.13-1.2+deb10u1
  • oldstable: 2.0.13-1.4+deb11u1
  • old-sec: 2.0.13-1.4+deb11u1
versioned links
  • 2.0.13-1.2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.0.13-1.2+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.0.13-1.4+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • duende
  • maradns
  • maradns-deadwood
  • maradns-docs
  • maradns-zoneserver
package is gone
This package is not in any development repository. This probably means that the package has been removed (or has been renamed). Thus the information here is of little interest ... the package is going to disappear unless someone takes it over and reintroduces it.
action needed
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2022-30256: An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.
  • CVE-2023-31137: MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination. The vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service. One proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len <= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58.
Created: 2023-10-22 Last update: 2023-10-22 12:54
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2022-30256: An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.
Created: 2022-11-21 Last update: 2023-02-12 18:00
news
[rss feed]
  • [2023-12-09] Accepted maradns 2.0.13-1.6 (source) into unstable (Chris Hofstaedtler) (signed by: Christian Hofstaedtler)
  • [2023-10-29] Accepted maradns 2.0.13-1.5 (source) into unstable (Aron Xu)
  • [2023-06-29] Accepted maradns 2.0.13-1.4+deb11u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Aron Xu)
  • [2023-06-29] Accepted maradns 2.0.13-1.4+deb11u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Aron Xu)
  • [2023-06-18] Accepted maradns 2.0.13-1.2+deb10u1 (source) into oldoldstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2023-03-01] maradns REMOVED from testing (Debian testing watch)
  • [2023-02-13] maradns 2.0.13-1.4 MIGRATED to testing (Debian testing watch)
  • [2023-01-05] maradns REMOVED from testing (Debian testing watch)
  • [2020-01-19] maradns 2.0.13-1.4 MIGRATED to testing (Debian testing watch)
  • [2020-01-14] Accepted maradns 2.0.13-1.4 (source) into unstable (Adrian Bunk)
  • [2020-01-14] Accepted maradns 2.0.13-1.3 (source) into unstable (Adrian Bunk)
  • [2019-12-15] maradns REMOVED from testing (Debian testing watch)
  • [2016-08-20] maradns 2.0.13-1.2 MIGRATED to testing (Debian testing watch)
  • [2016-08-14] Accepted maradns 2.0.13-1.2 (source) into unstable (Christian Hofstaedtler)
  • [2016-07-17] maradns 2.0.13-1.1 MIGRATED to testing (Debian testing watch)
  • [2016-07-11] Accepted maradns 2.0.13-1.1 (source amd64 all) into unstable (Christian Hofstaedtler)
  • [2015-10-08] maradns 2.0.13-1 MIGRATED to testing (Britney)
  • [2015-10-03] Accepted maradns 2.0.13-1 (source amd64 all) into unstable (Dariusz Dwornikowski)
  • [2015-08-30] maradns 2.0.12-1 MIGRATED to testing (Britney)
  • [2015-08-24] Accepted maradns 2.0.12-1 (source amd64 all) into unstable (Dariusz Dwornikowski)
  • [2015-07-28] maradns 2.0.11-1 MIGRATED to testing (Britney)
  • [2015-07-22] Accepted maradns 2.0.11-1 (source amd64 all) into unstable (Dariusz Dwornikowski)
  • [2015-04-27] maradns 2.0.09-4 MIGRATED to testing (Britney)
  • [2015-03-22] Accepted maradns 2.0.09-4 (source amd64 all) into unstable (Dariusz Dwornikowski)
  • [2015-02-07] maradns REMOVED from testing (Britney)
  • [2014-08-13] maradns 2.0.09-3 MIGRATED to testing (Britney)
  • [2014-08-07] Accepted maradns 2.0.09-3 (source amd64 all) into unstable (Dariusz Dwornikowski)
  • [2014-06-14] maradns REMOVED from testing (Debian testing watch)
  • [2014-03-18] maradns 2.0.09-2 MIGRATED to testing (Debian testing watch)
  • [2014-03-12] Accepted maradns 2.0.09-2 (source amd64 all) (Dariusz Dwornikowski) (signed by: Laszlo Kajan)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • buildd: logs, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing