UbuntuUpdates.org

Package "dnsmasq-base-lua"

Name: dnsmasq-base-lua

Description:

Small caching DNS proxy and DHCP/TFTP server

Latest version: 2.79-1ubuntu0.7
Release: bionic (18.04)
Level: security
Repository: universe
Head package: dnsmasq
Homepage: http://www.thekelleys.org.uk/dnsmasq/doc.html

Links


Download "dnsmasq-base-lua"


Other versions of "dnsmasq-base-lua" in Bionic

Repository Area Version
updates universe 2.79-1ubuntu0.7

Changelog

Version: 2.79-1ubuntu0.7 2023-04-20 10:07:09 UTC

  dnsmasq (2.79-1ubuntu0.7) bionic-security; urgency=medium

  * SECURITY UPDATE: IP fragmentation
    - src/config.h: update default max EDNS_PKTSZ to 1232 as agreed on
      dnsflagday 2020.
    - man/dnsmasq.8: updating documentation to reflect new default max
      EDNS_PKTSZ.
    - eb92fb32b746f2104b0f370b5b295bb8dd4bd5e5
    - CVE-2023-28450

 -- Ian Constantin <email address hidden> Tue, 18 Apr 2023 11:21:55 +0300

Source diff to previous version
CVE-2023-28450 An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day

Version: 2.79-1ubuntu0.6 2022-05-10 19:06:22 UTC

  dnsmasq (2.79-1ubuntu0.6) bionic-security; urgency=medium

  * SECURITY UPDATE: Heap use after free
    - debian/patches/CVE-2022-0934.patch: Fix write-after-free error in
      DHCPv6 code in src/rfc3315.c.
    - CVE-2022-0934

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 18 Apr 2022 12:41:06 -0300

Source diff to previous version

Version: 2.79-1ubuntu0.4 2021-06-02 14:06:25 UTC

  dnsmasq (2.79-1ubuntu0.4) bionic-security; urgency=medium

  * SECURITY UPDATE: fixed port use when specific server is requested
    - 74d4fcd756a85bc1823232ea74334f7ccfb9d5d2
    - CVE-2021-3448

 -- Marc Deslauriers <email address hidden> Thu, 06 May 2021 12:34:24 -0400

Source diff to previous version
CVE-2021-3448 A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed por

Version: 2.79-1ubuntu0.3 2021-02-24 15:06:48 UTC

  dnsmasq (2.79-1ubuntu0.3) bionic-security; urgency=medium

  * SECURITY REGRESSION: issue with multiple queries and issue with retries
    (LP: #1916462)
    - backport multiple upstream commits to fix regressions
      + 04490bf622ac84891aad6f2dd2edf83725decdee
      + 12af2b171de0d678d98583e2190789e544440e02
      + 3f535da79e7a42104543ef5c7b5fa2bed819a78b
      + 25e63f1e56f5acdcf91893a1b92ad1e0f2f552d8
      + 141a26f979b4bc959d8e866a295e24f8cf456920
      + 305cb79c5754d5554729b18a2c06fe7ce699687a

 -- Marc Deslauriers <email address hidden> Tue, 23 Feb 2021 08:02:05 -0500

Source diff to previous version
1916462 dnsmasq failed to send packet: Network is unreachable

Version: 2.79-1ubuntu0.2 2021-01-19 13:07:18 UTC

  dnsmasq (2.79-1ubuntu0.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - CVE-2020-25681: heap overflow in RRSets sorting
    - CVE-2020-25682: buffer overflow in extracting names from DNS packets
    - CVE-2020-25683: heap overflow in DNSSEC validation
    - CVE-2020-25684: cache poisoning issue via address/port
    - CVE-2020-25685: cache poisoning issue via weak hash
    - CVE-2020-25686: birthday attack via incorrect existing requests check
    - CVE-2020-25687: heap overflow in DNSSEC validation
    - CVE-2019-14834: memory leak via DHCP response creation

 -- Marc Deslauriers <email address hidden> Fri, 08 Jan 2021 09:59:59 -0500

CVE-2020-25681 RESERVED
CVE-2020-25682 RESERVED
CVE-2020-25683 RESERVED
CVE-2020-25684 RESERVED
CVE-2020-25685 RESERVED
CVE-2020-25686 RESERVED
CVE-2020-25687 RESERVED
CVE-2019-14834 A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumpt



About   -   Send Feedback to @ubuntu_updates