CERT is releasing six CVEs for serious security vulnerabilities in dnsmasq
Vulnerability impact and real‑world risk
- Commenters see these dnsmasq bugs as serious, especially because it’s embedded in many devices that rarely get updates.
- Attackers who compromise a home router can:
- MITM non‑encrypted traffic and SSH sessions where users blindly accept keys.
- Block OS/app update endpoints to keep internal machines vulnerable, then attack them.
- Abuse the router as a proxy, VPN exit, or DDoS node, and target IoT devices.
- Specific flaws mentioned include heap overflows, integer underflow, and infinite loops that can halt DNS responses.
Routers, OpenWRT, and embedded devices
- People worry about consumer routers and embedded gear that won’t be patched or are hard to flash.
- OpenWRT and DD‑WRT are reported as actively working on or already integrating fixes, but new builds are not all out yet.
Debian’s handling of dnsmasq and “stable”
- Large subthread debates Debian’s model:
- Critics call the dnsmasq in stable “embarrassingly ancient” and object to heavy backporting, arguing it’s resource‑intensive, discourages refactoring, and often leaves non‑security bugs unfixed for years.
- Defenders say stable is intentionally conservative: only minimal security/bug patches, major feature updates via testing/unstable every ~2 years, and optional backports/third‑party repos for newer stacks.
- Some argue this approach is vital for big orgs and “set and forget” machines; others see it as deferred maintenance that leads to painful mass upgrades.
AI‑generated CVEs and security audits
- Multiple comments note a “tsunami” of AI‑assisted bug reports; maintainers expect repeated patch cycles as tools keep finding new issues.
- Some projects reportedly see many AI‑found bugs; others (e.g., certain DNS and mail servers) claim none or very few, attributing that to stricter design and smaller, more carefully written codebases.
- Debate on whether less‑popular software has fewer bugs or just less scrutiny; AI is seen as lowering the cost of auditing even obscure projects.
C vs memory‑safe languages and rewrites
- Several argue this is a tipping point to replace C infrastructure with Rust/Go for DNS/DHCP, given the dominance of memory‑safety bugs.
- Others counter that rewrites are risky and can introduce many new logic and OS‑level bugs, citing a Rust coreutils replacement with dozens of CVEs.
- Some propose using AI more for auditing and for assisting partial rewrites, rather than full greenfield replacements.
Design and alternatives
- Some dislike dnsmasq’s “does everything” design, preferring separate DNS/DHCP/TFTP daemons; others value its integration for small routers.
- Alternatives like MaraDNS are discussed, with claims of strong security records and heavy auditing, but criticism over self‑promotion and smaller adoption.