UbuntuUpdates.org

Package "dnsmasq"

Name: dnsmasq

Description:

Small caching DNS proxy and DHCP/TFTP server

Latest version: 2.75-1ubuntu0.16.04.10
Release: xenial (16.04)
Level: updates
Repository: universe

Links


Download "dnsmasq"


Other versions of "dnsmasq" in Xenial

Repository Area Version
base main 2.75-1
base universe 2.75-1
security main 2.75-1ubuntu0.16.04.10
security universe 2.75-1ubuntu0.16.04.10
updates main 2.75-1ubuntu0.16.04.10

Changelog

Version: 2.75-1ubuntu0.16.04.10 2021-04-22 19:07:20 UTC

  dnsmasq (2.75-1ubuntu0.16.04.10) xenial-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - CVE-2017-15107: wildcard NSEC records interpretation issue
      + 4fe6744a220eddd3f1749b40cac3dfc510787de6
      + cd7df612b14ec1bf831a966ccaf076be0dae7404
    - CVE-2019-14513: DoS via improper bounds checking
      + d3a8b39c7df2f0debf3b5f274a1c37a9e261f94e

 -- Marc Deslauriers <email address hidden> Thu, 22 Apr 2021 09:12:18 -0400

Source diff to previous version
CVE-2017-15107 A vulnerability was found in the implementation of DNSSEC in Dnsmasq up to and including 2.78. Wildcard synthesized NSEC records could be improperly
CVE-2019-14513 Improper bounds checking in Dnsmasq before 2.76 allows an attacker controlled DNS server to send large DNS packets that result in a read operation be

Version: 2.75-1ubuntu0.16.04.8 2021-02-24 16:07:46 UTC

  dnsmasq (2.75-1ubuntu0.16.04.8) xenial-security; urgency=medium

  * SECURITY REGRESSION: issue with multiple queries (LP: #1916462)
    - backport multiple upstream commits to fix regressions
      + 04490bf622ac84891aad6f2dd2edf83725decdee
      + 12af2b171de0d678d98583e2190789e544440e02
      + 3f535da79e7a42104543ef5c7b5fa2bed819a78b
      + 141a26f979b4bc959d8e866a295e24f8cf456920
      + 305cb79c5754d5554729b18a2c06fe7ce699687a

 -- Marc Deslauriers <email address hidden> Tue, 23 Feb 2021 08:32:59 -0500

Source diff to previous version
1916462 dnsmasq failed to send packet: Network is unreachable

Version: 2.75-1ubuntu0.16.04.7 2021-01-19 15:07:09 UTC

  dnsmasq (2.75-1ubuntu0.16.04.7) xenial-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - CVE-2020-25681: heap overflow in RRSets sorting
    - CVE-2020-25682: buffer overflow in extracting names from DNS packets
    - CVE-2020-25683: heap overflow in DNSSEC validation
    - CVE-2020-25684: cache poisoning issue via address/port
    - CVE-2020-25685: cache poisoning issue via weak hash
    - CVE-2020-25686: birthday attack via incorrect existing requests check
    - CVE-2020-25687: heap overflow in DNSSEC validation
    - CVE-2019-14834: memory leak via DHCP response creation

 -- Marc Deslauriers <email address hidden> Fri, 08 Jan 2021 12:34:33 -0500

Source diff to previous version
CVE-2020-25681 RESERVED
CVE-2020-25682 RESERVED
CVE-2020-25683 RESERVED
CVE-2020-25684 RESERVED
CVE-2020-25685 RESERVED
CVE-2020-25686 RESERVED
CVE-2020-25687 RESERVED
CVE-2019-14834 A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumpt

Version: 2.75-1ubuntu0.16.04.5 2018-07-12 17:06:57 UTC

  dnsmasq (2.75-1ubuntu0.16.04.5) xenial-security; urgency=medium

  * trusty-anchors.conf: Update DNSSEC trust anchors
    - 05da782f8f45933915af0ef3cc1ba35e31d20c59

 -- Marc Deslauriers <email address hidden> Thu, 12 Jul 2018 09:39:42 -0400

Source diff to previous version

Version: 2.75-1ubuntu0.16.04.4 2017-11-22 03:06:46 UTC

  dnsmasq (2.75-1ubuntu0.16.04.4) xenial; urgency=medium

  * Fix replying prematurely if one of many servers replies REFUSED
    (LP: #1726017) by adding two upstream patches.
    - 2.76: 4ace25c5d6: Treat REFUSED (not SERVFAIL) as an unsuccessful
      upstream response
    - 2.77: 68f6312d4b: Stop treating SERVFAIL as a successful response from
      upstream servers.

 -- Christian Ehrhardt <email address hidden> Mon, 23 Oct 2017 08:32:22 +0200

1726017 dnsmasq prematurely returns REFUSED, breaking resolver



About   -   Send Feedback to @ubuntu_updates