Change logs for dnsmasq source package in Bionic

  • dnsmasq (2.79-1ubuntu0.7) bionic-security; urgency=medium
    
      * SECURITY UPDATE: IP fragmentation
        - src/config.h: update default max EDNS_PKTSZ to 1232 as agreed on
          dnsflagday 2020.
        - man/dnsmasq.8: updating documentation to reflect new default max
          EDNS_PKTSZ.
        - eb92fb32b746f2104b0f370b5b295bb8dd4bd5e5
        - CVE-2023-28450
    
     -- Ian Constantin <email address hidden>  Tue, 18 Apr 2023 11:21:55 +0300
  • dnsmasq (2.79-1ubuntu0.6) bionic-security; urgency=medium
    
      * SECURITY UPDATE: Heap use after free
        - debian/patches/CVE-2022-0934.patch: Fix write-after-free error in
          DHCPv6 code in src/rfc3315.c.
        - CVE-2022-0934
    
     -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 18 Apr 2022 12:41:06 -0300
  • dnsmasq (2.79-1ubuntu0.5) bionic; urgency=medium
    
      * src/forward.c: add missing EDNS0 section. (LP: #1785383)
    
     -- Paride Legovini <email address hidden>  Fri, 24 Sep 2021 13:05:51 +0200
  • dnsmasq (2.79-1ubuntu0.4) bionic-security; urgency=medium
    
      * SECURITY UPDATE: fixed port use when specific server is requested
        - 74d4fcd756a85bc1823232ea74334f7ccfb9d5d2
        - CVE-2021-3448
    
     -- Marc Deslauriers <email address hidden>  Thu, 06 May 2021 12:34:24 -0400
  • dnsmasq (2.79-1ubuntu0.3) bionic-security; urgency=medium
    
      * SECURITY REGRESSION: issue with multiple queries and issue with retries
        (LP: #1916462)
        - backport multiple upstream commits to fix regressions
          + 04490bf622ac84891aad6f2dd2edf83725decdee
          + 12af2b171de0d678d98583e2190789e544440e02
          + 3f535da79e7a42104543ef5c7b5fa2bed819a78b
          + 25e63f1e56f5acdcf91893a1b92ad1e0f2f552d8
          + 141a26f979b4bc959d8e866a295e24f8cf456920
          + 305cb79c5754d5554729b18a2c06fe7ce699687a
    
     -- Marc Deslauriers <email address hidden>  Tue, 23 Feb 2021 08:02:05 -0500
  • dnsmasq (2.79-1ubuntu0.2) bionic-security; urgency=medium
    
      * SECURITY UPDATE: Multiple security issues
        - CVE-2020-25681: heap overflow in RRSets sorting
        - CVE-2020-25682: buffer overflow in extracting names from DNS packets
        - CVE-2020-25683: heap overflow in DNSSEC validation
        - CVE-2020-25684: cache poisoning issue via address/port
        - CVE-2020-25685: cache poisoning issue via weak hash
        - CVE-2020-25686: birthday attack via incorrect existing requests check
        - CVE-2020-25687: heap overflow in DNSSEC validation
        - CVE-2019-14834: memory leak via DHCP response creation
    
     -- Marc Deslauriers <email address hidden>  Fri, 08 Jan 2021 09:59:59 -0500
  • dnsmasq (2.79-1) unstable; urgency=low
    
       * New upstream. (closes: #888200)
       * Fix trust-anchor regex in init script. (closes: #884347)
       * Fix exit code for dhcp_release6 (closes: #833596)
       * Add project homepage to control file. (closes: #887764)
       * New binary package dnsmasq-base-lua, includes Lua support.
       * Remove hardwired shlibs dependency for libnettle 3.3 and
         fix code to avoid ABI breakage as long as compiled against
         libnettle 3.4 or later. (closes: #891315)
    
     -- Simon Kelley <email address hidden>  Fri, 16 Feb 2018 19:54:22 +0000
  • dnsmasq (2.78-3) unstable; urgency=high
    
       * Make failure of pidfile chown a warning. (closes: #889857)
      
     -- Simon Kelley <email address hidden>  Thu, 8 Feb 2018 21:26:30 +0000
  • dnsmasq (2.78-2) unstable; urgency=high
    
       * Change ownership of pid file, to keep systemd happy. (closes: #889336)
      
     -- Simon Kelley <email address hidden>  Tue, 6 Feb 2018 17:21:30 +0000
  • dnsmasq (2.78-1) unstable; urgency=high
    
       * New upstream.
         Security fixes for CVE-2017-13704  (closes: #877102)
         Security fixes for CVE-2017-14491 - CVE-2017-14496 inclusive.	
    
     -- Simon Kelley <email address hidden>  Sun, 29 Sep 2017 21:34:00 +0000