Change log for dnsmasq package in Ubuntu

175 of 160 results
Published in oracular-release
Published in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
dnsmasq (2.90-2build2) noble; urgency=medium

  * No-change rebuild for CVE-2024-3094

 -- Steve Langasek <email address hidden>  Sun, 31 Mar 2024 08:48:56 +0000

Available diffs

Published in oracular-proposed
dnsmasq (2.90-3) unstable; urgency=medium

  * Update d/control:
    - Add passwd to Depends of dnsmasq-base(-lua) (closes: #1064518).
    - Update the Vcs-* fields (closes: #1065347).
    - Fix lintian issue build-depends-on-obsolete-package.
    - Add myself as uploader.
  * Update d/copyright:
    - Fix lintian issue missing-field-in-dep5-copyright.
  * Add missing CVE number to the 2.90-1 change log.

 -- Sven Geuer <email address hidden>  Sat, 09 Mar 2024 20:18:53 +0100
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
dnsmasq (2.90-2build1) noble; urgency=medium

  * No-change rebuild against libhogweed6t64

 -- Steve Langasek <email address hidden>  Sun, 03 Mar 2024 06:22:49 +0000

Available diffs

Published in focal-updates
Published in focal-security
dnsmasq (2.90-0ubuntu0.20.04.1) focal-security; urgency=medium

  * Updated to 2.90 to fix multiple security issues.
    - debian/rules: specify lua version with LUA.
    - CVE-2023-50387, CVE-2023-50868
  * Convert package to source format 3.0 to ease maintenance going forward.

 -- Marc Deslauriers <email address hidden>  Wed, 14 Feb 2024 14:58:58 -0500
Published in jammy-updates
Published in jammy-security
dnsmasq (2.90-0ubuntu0.22.04.1) jammy-security; urgency=medium

  * Updated to 2.90 to fix multiple security issues.
    - debian/rules: specify lua version with LUA.
    - CVE-2023-50387, CVE-2023-50868
  * Convert package to source format 3.0 to ease maintenance going forward.

 -- Marc Deslauriers <email address hidden>  Wed, 14 Feb 2024 14:23:43 -0500
Published in mantic-updates
Published in mantic-security
dnsmasq (2.90-0ubuntu0.23.10.1) mantic-security; urgency=medium

  * Updated to 2.90 to fix multiple security issues.
    - debian/rules: specify lua version with LUA.
    - CVE-2023-28450, CVE-2023-50387, CVE-2023-50868
  * Convert package to source format 3.0 to ease maintenance going forward.

 -- Marc Deslauriers <email address hidden>  Wed, 14 Feb 2024 13:35:34 -0500
Deleted in noble-updates (Reason: superseded by release)
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
dnsmasq (2.90-2) unstable; urgency=medium

  [ Sven Geuer ]
  * Relax limits imposed by d/t/functions.d/ip-addr.patterns to allow for
    successful tests on ci.debian.net.

 -- Simon Kelley <email address hidden>  Wed, 14 Feb 2024 11:33:14 +0000

Available diffs

Superseded in noble-proposed
dnsmasq (2.90-1) unstable; urgency=medium

  [ Simon Kelley ]
  * New upstream. (closes: #1033165)
  * Move hard-coding of Lua version from the upstream Makefile
    to  d/rules.
  * Security fixes for Keytrap - DNSSEC validation CPU exhaustion.
    CVE-2023-50387 and CVE-2023-50868
  [ Sven Geuer ]
  * Introduce autokpgtests per d/tests/* (closes: #1034135).
  * Switch to dpkg-source 3.0 (quilt) format (closes: #1007041).
  * doc.html: Add patch to eliminate privacy breaches leaving the Donations
    paragraph as untouched as possible.
  * Prepend dnsmasq. to default, init, preinst, postinst, prerm, postrm.
  * Rename d/systemd.service to d/dnsmasq.service.
  * Rename d/systemd@.service to d/dnsmasq@.service.
  * Refactor d/rules to use the DH sequencer and fix major lintian issues
    (closes: #844989, #1040923, #1063551).
    Modified files:
    - d/rules
        Complete rewrite making use of debhelper and its tools, fixes lintian
        warning debian-rules-sets-dpkg-architecture-variable.
    - d/control
        Build-Depends, Pre-Depends, Depends added or changed as needed, lintian
        error depends-on-obsolete-package fixed.
    - d/dnsmasq.default
        ENABLED removed and comment changed to fix lintian error
        init.d-script-should-always-start-service.
    - d/dnsmasq.init
        Remove handling of obsolete ENABLED flag.
        Extract code used with System-V-style init and systemd into
        d/init-system-common, extract code used with systemd only
        into d/systemd-helper. This fixes lintian warning
        systemd-service-file-wraps-init-script.
        Drop workaround for hypothetically non-existent file
        /lib/lsb/init-functions, it has been around for more than a decade.
    - d/dnsmasq.service, d/dnsmasq@.service
        Adapt these files to make use of init-system-common and systemd-helper.
    - d/dnsmasq.{post,pre}{inst,rm}
        Rely mostly on the script snippets created by the DH tools to get
        things done, implicitly fixes the lintian warnings
        maintainer-script-should-not-use-dpkg-maintscript-helper and
        command-with-path-in-maintainer-script.
    - d/resolvconf*
        Change file mode bits to 0755, the installed files need it
    New files:
    - d/dnsmasq.{install,links,maintscript}
    - d/dnsmasq-base.{dirs,docs,install}
    - d/dnsmasq-base-lua.{dirs,docs,install,links}
    - d/dnsmasq-utils.{install,manpages}
        The DH tools use these to install what was scripted explicitly
        in the previous version of the d/rules file,
        lintian warning dbus-policy-in-etc fixed
    - d/init-system-common
    - d/systemd-helper
        These files contain slightly modified code formerly part of in
        d/dnsmasq.init.
    Deleted files:
    - d/*conffiles
    - d/lintian-override
    - d/installed-marker
        These are not in use anymore.
  * Deal with a removed conffile and changed links.
    Modified files:
    - d/dnsmasq-base.{postinst,postrm}
    New files:
    - d/dnsmasq-base.maintscript
    - d/dnsmasq-base-lua.maintscript
  * Add watch file and upstream's signing key.
    New files:
    - d/watch
    - d/u/signing-key.asc
  * Remove dependency on package adduser.
    Modified files:
    - d/control
    - d/dnsmasq.post{inst,rm}
  * Refactor d/copyright to comply with DEP 5 (closes: #966505).
  * Remove trailing whitespace from various files under debian/.
  * Bump Standards-Version to 4.6.2.
  * Specify Rules-Requires-Root.
  * Update http:// to https:// with Homepage, Vcs-Git and Vcs-Browser.
  * Introduce d/u/metadata.
  * Fix lintian issue duplicate-short-description.
  * Fix lintian issue capitalization-error-in-description.
  * Bump Lua version to 5.4 (closes: #1050750).
    Modified files:
    - d/control
    - d/t/functions.d/log.patterns

 -- Simon Kelley <email address hidden>  Fri, 23 Jan 2024 22:52:01 +0000
Superseded in jammy-updates
Deleted in jammy-proposed (Reason: moved to -updates)
dnsmasq (2.86-1.1ubuntu0.5) jammy; urgency=medium

  * src/dnsmasq.c: Fix a crash that can happen when an empty resolv.conf is
    reloaded (LP: #2045570)
  * src/helper.c: Fix wrong client address for dhcp-script when DHCPv4 relay
    in use (LP: #2042587)

 -- Andreas Hasenack <email address hidden>  Thu, 11 Jan 2024 09:21:27 -0300
Superseded in jammy-updates
Deleted in jammy-proposed (Reason: moved to -updates)
dnsmasq (2.86-1.1ubuntu0.4) jammy; urgency=medium

  * src/dnsmasq.h, src/domain-match.c: Fix confusion when using resolvconf
    servers (combining server|address for a domain), resulting in the struct
    server datastructure for server=/domain/# getting passed to
    forward_query(), rapidly followed by a SEGV. This fix makes
    server=/domain/# a fully fledged member of the priority list.
    The code added here is a cherry pick released in upstream version
    2.87, originating at
    https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=de372d69
    (LP: #2015562)

 -- Miriam España Acebal <email address hidden>  Thu, 20 Apr 2023 11:00:27 +0200
Obsolete in kinetic-updates
Obsolete in kinetic-security
dnsmasq (2.86-1.1ubuntu2.1) kinetic-security; urgency=medium

  * SECURITY UPDATE: IP fragmentation
    - src/config.h: update default max EDNS_PKTSZ to 1232 as agreed on
      dnsflagday 2020.
    - man/dnsmasq.8: updating documentation to reflect new default max
      EDNS_PKTSZ.
    - eb92fb32b746f2104b0f370b5b295bb8dd4bd5e5
    - CVE-2023-28450

 -- Ian Constantin <email address hidden>  Tue, 18 Apr 2023 11:23:04 +0300
Superseded in jammy-updates
Superseded in jammy-security
dnsmasq (2.86-1.1ubuntu0.3) jammy-security; urgency=medium

  * SECURITY UPDATE: IP fragmentation
    - src/config.h: update default max EDNS_PKTSZ to 1232 as agreed on
      dnsflagday 2020.
    - man/dnsmasq.8: updating documentation to reflect new default max
      EDNS_PKTSZ.
    - eb92fb32b746f2104b0f370b5b295bb8dd4bd5e5
    - CVE-2023-28450

 -- Ian Constantin <email address hidden>  Tue, 18 Apr 2023 11:11:46 +0300
Superseded in focal-updates
Superseded in focal-security
dnsmasq (2.80-1.1ubuntu1.7) focal-security; urgency=medium

  * SECURITY UPDATE: IP fragmentation
    - src/config.h: update default max EDNS_PKTSZ to 1232 as agreed on
      dnsflagday 2020.
    - man/dnsmasq.8: updating documentation to reflect new default max
      EDNS_PKTSZ.
    - eb92fb32b746f2104b0f370b5b295bb8dd4bd5e5
    - CVE-2023-28450

 -- Ian Constantin <email address hidden>  Tue, 18 Apr 2023 11:12:00 +0300
Published in bionic-updates
Published in bionic-security
dnsmasq (2.79-1ubuntu0.7) bionic-security; urgency=medium

  * SECURITY UPDATE: IP fragmentation
    - src/config.h: update default max EDNS_PKTSZ to 1232 as agreed on
      dnsflagday 2020.
    - man/dnsmasq.8: updating documentation to reflect new default max
      EDNS_PKTSZ.
    - eb92fb32b746f2104b0f370b5b295bb8dd4bd5e5
    - CVE-2023-28450

 -- Ian Constantin <email address hidden>  Tue, 18 Apr 2023 11:21:55 +0300
Superseded in jammy-updates
Deleted in jammy-proposed (Reason: moved to -updates)
dnsmasq (2.86-1.1ubuntu0.2) jammy; urgency=medium

  * src/forward.c: Do not refuse retries from client DNS queries. Behaviour to
    stop infinite loops when all servers return REFUSED was wrongly activated
    on client retries, resulting in incorrect REFUSED replies to client
    retries. The code added here is a cherry pick released in upstream version
    2.87, originating at
    https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=2561f9fe0eb9c0be
    (LP: #1981794)

 -- Lena Voytek <email address hidden>  Fri, 14 Oct 2022 14:39:41 -0700
Superseded in noble-release
Published in mantic-release
Published in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
dnsmasq (2.89-1) unstable; urgency=low

   * New upstream.

 -- Simon Kelley <email address hidden>  Fri, 13 Jan 2023 21:57:01 +0000

Available diffs

Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
dnsmasq (2.88-1) unstable; urgency=low

   * New upstream.
   * Fix loss of server configuration (closes: #1020830)
     Git commit 930428fb970f4991e5c2933fd5a5d2504c18a551

 -- Simon Kelley <email address hidden>  Wed, 2 Nov 2022 22:15:45 +0000

Available diffs

Superseded in focal-updates
Deleted in focal-proposed (Reason: moved to -updates)
dnsmasq (2.80-1.1ubuntu1.6) focal; urgency=medium

  * src/cache.c: Apply 162e5e0062ce923c494cc64282f293f0ed64fc10 from
    upstream GIT to fix bug in DNS non-terminal code, added in 2.80,
    which could sometimes cause a NODATA rather than an NXDOMAIN
    reply (LP: #1995260).

 -- Miriam España Acebal <email address hidden>  Tue, 15 Nov 2022 10:35:15 +0100
Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
dnsmasq (2.87-1.1) unstable; urgency=medium

  * Non-maintainer upload.
  * No source change upload to rebuild with debhelper 13.10.

 -- Michael Biebl <email address hidden>  Sat, 15 Oct 2022 12:01:25 +0200
Superseded in lunar-release
Obsolete in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
dnsmasq (2.86-1.1ubuntu2) kinetic; urgency=medium

  * src/forward.c: Do not refuse retries from client DNS queries. Behaviour to
    stop infinite loops when all servers return REFUSED was wrongly activated
    on client retries, resulting in incorrect REFUSED replies to client
    retries. The code added here is a cherry pick released in upstream version
    2.87, originating at
    https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=2561f9fe0eb9c0be
    (LP: #1981794)

 -- Lena Voytek <email address hidden>  Fri, 30 Sep 2022 08:42:39 -0700
Superseded in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
dnsmasq (2.86-1.1ubuntu1) kinetic; urgency=medium

  * SECURITY UPDATE: Heap use after free
    - 03345ecefeb0d82e3c3a4c28f27c3554f0611b39: Fix write-after-free error in
      DHCPv6 code in src/rfc3315.c.
    - CVE-2022-0934

 -- Leonidas Da Silva Barbosa <email address hidden>  Wed, 13 Jul 2022 12:10:53 -0300
Superseded in jammy-updates
Superseded in jammy-security
dnsmasq (2.86-1.1ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Heap use after free
    - debian/patches/CVE-2022-0934.patch: Fix write-after-free error in
      DHCPv6 code in src/rfc3315.c.
    - CVE-2022-0934

 -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 02 May 2022 12:09:51 -0300
Obsolete in impish-updates
Obsolete in impish-security
dnsmasq (2.85-1ubuntu2.1) impish-security; urgency=medium

  * SECURITY UPDATE: Heap use after free
    - debian/patches/CVE-2022-0934.patch: Fix write-after-free error in
      DHCPv6 code in src/rfc3315.c.
    - CVE-2022-0934

 -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 18 Apr 2022 11:55:36 -0300
Superseded in focal-updates
Superseded in focal-security
dnsmasq (2.80-1.1ubuntu1.5) focal-security; urgency=medium

  * SECURITY UPDATE: Heap use after free
    - debian/patches/CVE-2022-0934.patch: Fix write-after-free error in
      DHCPv6 code in src/rfc3315.c.
    - CVE-2022-0934

 -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 18 Apr 2022 12:25:39 -0300
Superseded in bionic-updates
Superseded in bionic-security
dnsmasq (2.79-1ubuntu0.6) bionic-security; urgency=medium

  * SECURITY UPDATE: Heap use after free
    - debian/patches/CVE-2022-0934.patch: Fix write-after-free error in
      DHCPv6 code in src/rfc3315.c.
    - CVE-2022-0934

 -- Leonidas Da Silva Barbosa <email address hidden>  Mon, 18 Apr 2022 12:41:06 -0300
Superseded in kinetic-release
Published in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
dnsmasq (2.86-1.1) unstable; urgency=medium

  * Non-maintainer upload.
  * Fix --address=/#/...... which was lost in 2.86. (closes: #995655)

 -- Michael Biebl <email address hidden>  Wed, 10 Nov 2021 22:05:45 +0100
Superseded in bionic-updates
Deleted in bionic-proposed (Reason: moved to -updates)
dnsmasq (2.79-1ubuntu0.5) bionic; urgency=medium

  * src/forward.c: add missing EDNS0 section. (LP: #1785383)

 -- Paride Legovini <email address hidden>  Fri, 24 Sep 2021 13:05:51 +0200
Superseded in jammy-release
Obsolete in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
dnsmasq (2.85-1ubuntu2) impish; urgency=medium

  * Revert: "src/radv.c: avoid leases to be issued forever when not set"
    (LP 1894619) according to the bug and upstream discussion.

 -- Christian Ehrhardt <email address hidden>  Tue, 22 Jun 2021 07:18:30 +0200

Available diffs

Superseded in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
dnsmasq (2.85-1ubuntu1) impish; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - src/radv.c: avoid leases to be issued forever when not set
      (LP 1894619)

 -- Christian Ehrhardt <email address hidden>  Wed, 02 Jun 2021 09:34:26 +0200

Available diffs

Superseded in bionic-updates
Superseded in bionic-security
dnsmasq (2.79-1ubuntu0.4) bionic-security; urgency=medium

  * SECURITY UPDATE: fixed port use when specific server is requested
    - 74d4fcd756a85bc1823232ea74334f7ccfb9d5d2
    - CVE-2021-3448

 -- Marc Deslauriers <email address hidden>  Thu, 06 May 2021 12:34:24 -0400
Obsolete in groovy-updates
Obsolete in groovy-security
dnsmasq (2.82-1ubuntu1.3) groovy-security; urgency=medium

  * SECURITY UPDATE: fixed port use when specific server is requested
    - 74d4fcd756a85bc1823232ea74334f7ccfb9d5d2
    - CVE-2021-3448

 -- Marc Deslauriers <email address hidden>  Thu, 06 May 2021 12:34:24 -0400
Superseded in focal-updates
Superseded in focal-security
dnsmasq (2.80-1.1ubuntu1.4) focal-security; urgency=medium

  * SECURITY UPDATE: fixed port use when specific server is requested
    - 74d4fcd756a85bc1823232ea74334f7ccfb9d5d2
    - CVE-2021-3448

 -- Marc Deslauriers <email address hidden>  Thu, 06 May 2021 12:34:24 -0400
Obsolete in hirsute-updates
Obsolete in hirsute-security
dnsmasq (2.84-1ubuntu2.1) hirsute-security; urgency=medium

  * SECURITY UPDATE: fixed port use when specific server is requested
    - 74d4fcd756a85bc1823232ea74334f7ccfb9d5d2
    - CVE-2021-3448

 -- Marc Deslauriers <email address hidden>  Thu, 06 May 2021 12:34:24 -0400
Published in xenial-updates
Published in xenial-security
dnsmasq (2.75-1ubuntu0.16.04.10) xenial-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - CVE-2017-15107: wildcard NSEC records interpretation issue
      + 4fe6744a220eddd3f1749b40cac3dfc510787de6
      + cd7df612b14ec1bf831a966ccaf076be0dae7404
    - CVE-2019-14513: DoS via improper bounds checking
      + d3a8b39c7df2f0debf3b5f274a1c37a9e261f94e

 -- Marc Deslauriers <email address hidden>  Thu, 22 Apr 2021 09:12:18 -0400
Superseded in xenial-updates
Superseded in xenial-security
dnsmasq (2.75-1ubuntu0.16.04.8) xenial-security; urgency=medium

  * SECURITY REGRESSION: issue with multiple queries (LP: #1916462)
    - backport multiple upstream commits to fix regressions
      + 04490bf622ac84891aad6f2dd2edf83725decdee
      + 12af2b171de0d678d98583e2190789e544440e02
      + 3f535da79e7a42104543ef5c7b5fa2bed819a78b
      + 141a26f979b4bc959d8e866a295e24f8cf456920
      + 305cb79c5754d5554729b18a2c06fe7ce699687a

 -- Marc Deslauriers <email address hidden>  Tue, 23 Feb 2021 08:32:59 -0500
Superseded in bionic-updates
Superseded in bionic-security
dnsmasq (2.79-1ubuntu0.3) bionic-security; urgency=medium

  * SECURITY REGRESSION: issue with multiple queries and issue with retries
    (LP: #1916462)
    - backport multiple upstream commits to fix regressions
      + 04490bf622ac84891aad6f2dd2edf83725decdee
      + 12af2b171de0d678d98583e2190789e544440e02
      + 3f535da79e7a42104543ef5c7b5fa2bed819a78b
      + 25e63f1e56f5acdcf91893a1b92ad1e0f2f552d8
      + 141a26f979b4bc959d8e866a295e24f8cf456920
      + 305cb79c5754d5554729b18a2c06fe7ce699687a

 -- Marc Deslauriers <email address hidden>  Tue, 23 Feb 2021 08:02:05 -0500
Superseded in focal-updates
Superseded in focal-security
dnsmasq (2.80-1.1ubuntu1.3) focal-security; urgency=medium

  * SECURITY REGRESSION: issue with multiple queries and issue with retries
    (LP: #1916462)
    - backport multiple upstream commits to fix regressions
      + 04490bf622ac84891aad6f2dd2edf83725decdee
      + 12af2b171de0d678d98583e2190789e544440e02
      + 3f535da79e7a42104543ef5c7b5fa2bed819a78b
      + 25e63f1e56f5acdcf91893a1b92ad1e0f2f552d8
      + 141a26f979b4bc959d8e866a295e24f8cf456920
      + 305cb79c5754d5554729b18a2c06fe7ce699687a

 -- Marc Deslauriers <email address hidden>  Tue, 23 Feb 2021 07:58:11 -0500
Superseded in groovy-updates
Superseded in groovy-security
dnsmasq (2.82-1ubuntu1.2) groovy-security; urgency=medium

  * SECURITY REGRESSION: issue with multiple queries and issue with retries
    (LP: #1916462)
    - backport multiple upstream commits to fix regressions
      + 04490bf622ac84891aad6f2dd2edf83725decdee
      + 12af2b171de0d678d98583e2190789e544440e02
      + 3f535da79e7a42104543ef5c7b5fa2bed819a78b
      + 25e63f1e56f5acdcf91893a1b92ad1e0f2f552d8
      + 141a26f979b4bc959d8e866a295e24f8cf456920
      + 305cb79c5754d5554729b18a2c06fe7ce699687a

 -- Marc Deslauriers <email address hidden>  Tue, 23 Feb 2021 07:52:53 -0500
Superseded in impish-release
Obsolete in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
dnsmasq (2.84-1ubuntu2) hirsute; urgency=medium

  * No change rebuild with fixed ownership.

 -- Dimitri John Ledkov <email address hidden>  Tue, 16 Feb 2021 15:12:23 +0000
Superseded in hirsute-proposed
dnsmasq (2.84-1ubuntu1) hirsute; urgency=medium

  * Resynchronize on Debian, remaining change
  * src/radv.c: avoid leases to be issued forever when not set
    LP: #1894619)

Available diffs

Superseded in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
dnsmasq (2.82-1ubuntu2) hirsute; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - CVE-2020-25681: heap overflow in RRSets sorting
    - CVE-2020-25682: buffer overflow in extracting names from DNS packets
    - CVE-2020-25683: heap overflow in DNSSEC validation
    - CVE-2020-25684: cache poisoning issue via address/port
    - CVE-2020-25685: cache poisoning issue via weak hash
    - CVE-2020-25686: birthday attack via incorrect existing requests check
    - CVE-2020-25687: heap overflow in DNSSEC validation

 -- Marc Deslauriers <email address hidden>  Fri, 08 Jan 2021 09:50:21 -0500

Available diffs

Superseded in bionic-updates
Superseded in bionic-security
dnsmasq (2.79-1ubuntu0.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - CVE-2020-25681: heap overflow in RRSets sorting
    - CVE-2020-25682: buffer overflow in extracting names from DNS packets
    - CVE-2020-25683: heap overflow in DNSSEC validation
    - CVE-2020-25684: cache poisoning issue via address/port
    - CVE-2020-25685: cache poisoning issue via weak hash
    - CVE-2020-25686: birthday attack via incorrect existing requests check
    - CVE-2020-25687: heap overflow in DNSSEC validation
    - CVE-2019-14834: memory leak via DHCP response creation

 -- Marc Deslauriers <email address hidden>  Fri, 08 Jan 2021 09:59:59 -0500

Available diffs

Superseded in xenial-updates
Superseded in xenial-security
dnsmasq (2.75-1ubuntu0.16.04.7) xenial-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - CVE-2020-25681: heap overflow in RRSets sorting
    - CVE-2020-25682: buffer overflow in extracting names from DNS packets
    - CVE-2020-25683: heap overflow in DNSSEC validation
    - CVE-2020-25684: cache poisoning issue via address/port
    - CVE-2020-25685: cache poisoning issue via weak hash
    - CVE-2020-25686: birthday attack via incorrect existing requests check
    - CVE-2020-25687: heap overflow in DNSSEC validation
    - CVE-2019-14834: memory leak via DHCP response creation

 -- Marc Deslauriers <email address hidden>  Fri, 08 Jan 2021 12:34:33 -0500
Superseded in focal-updates
Superseded in focal-security
dnsmasq (2.80-1.1ubuntu1.2) focal-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - CVE-2020-25681: heap overflow in RRSets sorting
    - CVE-2020-25682: buffer overflow in extracting names from DNS packets
    - CVE-2020-25683: heap overflow in DNSSEC validation
    - CVE-2020-25684: cache poisoning issue via address/port
    - CVE-2020-25685: cache poisoning issue via weak hash
    - CVE-2020-25686: birthday attack via incorrect existing requests check
    - CVE-2020-25687: heap overflow in DNSSEC validation
    - CVE-2019-14834: memory leak via DHCP response creation

 -- Marc Deslauriers <email address hidden>  Fri, 08 Jan 2021 09:59:59 -0500
Superseded in groovy-updates
Superseded in groovy-security
dnsmasq (2.82-1ubuntu1.1) groovy-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - CVE-2020-25681: heap overflow in RRSets sorting
    - CVE-2020-25682: buffer overflow in extracting names from DNS packets
    - CVE-2020-25683: heap overflow in DNSSEC validation
    - CVE-2020-25684: cache poisoning issue via address/port
    - CVE-2020-25685: cache poisoning issue via weak hash
    - CVE-2020-25686: birthday attack via incorrect existing requests check
    - CVE-2020-25687: heap overflow in DNSSEC validation

 -- Marc Deslauriers <email address hidden>  Fri, 08 Jan 2021 09:50:21 -0500
Superseded in hirsute-release
Obsolete in groovy-release
Deleted in groovy-proposed (Reason: moved to Release)
dnsmasq (2.82-1ubuntu1) groovy; urgency=medium

  * src/radv.c: avoid leases to be issued forever when not set (LP: #1894619)

 -- Christian Ehrhardt <email address hidden>  Wed, 16 Sep 2020 14:26:58 +0200
Superseded in groovy-proposed
Deleted in groovy-proposed (Reason: Reverting to avoid delaying nettle transition)
dnsmasq (2.82-1) unstable; urgency=low

   * New upstream.

 -- Simon Kelley <email address hidden>  Fri, 26 Jun 2020 22:22:41 +0000
Superseded in groovy-release
Deleted in groovy-proposed (Reason: moved to Release)
Superseded in groovy-proposed
dnsmasq (2.81-4build1) groovy; urgency=medium

  * No change rebuild against new libnettle8 and libhogweed6 ABI.

 -- Dimitri John Ledkov <email address hidden>  Mon, 29 Jun 2020 22:23:32 +0100
Superseded in groovy-release
Deleted in groovy-proposed (Reason: moved to Release)
dnsmasq (2.81-4) unstable; urgency=low

   * Remove runit support when building for Ubuntu. (closes: #960401)

 -- Simon Kelley <email address hidden>  Fri, 26 Jun 2020 21:52:44 +0000
Superseded in groovy-release
Deleted in groovy-proposed (Reason: moved to Release)
dnsmasq (2.81-3ubuntu2) groovy; urgency=medium

  * Additional fix for build without dh_runit.

 -- Steve Langasek <email address hidden>  Thu, 07 May 2020 22:13:42 +0000
Superseded in groovy-proposed
dnsmasq (2.81-3ubuntu1) groovy; urgency=medium

  * Drop dh_runit handling, unsupported in Ubuntu and causes a build
    failure.

 -- Steve Langasek <email address hidden>  Thu, 07 May 2020 14:30:53 -0700

Available diffs

Superseded in groovy-proposed
dnsmasq (2.81-3) unstable; urgency=low

   * Fixes to control file for bug 958100

 -- Simon Kelley <email address hidden>  Sun, 19 Apr 2020 21:44:12 +0000
Superseded in groovy-release
Published in focal-release
Deleted in focal-proposed (Reason: moved to Release)
dnsmasq (2.80-1.1ubuntu1) focal; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Revert upstream commit 3af747d94bae66a2a1b564b2d04161a78159a434:
      "Do unsolicited RAs for interfaces which appear after dnsmasq startup."
      - it caused a regression in the network-manager autopkgtests.
    - Fix FTBFS in eoan due to glibc 2.30 SIOCGSTAMP changes
    - Apply ab73a746a0d6fcac2e682c5548eeb87fb9c9c82e from upstream GIT to fix
      build error against nettle 3.5.

Available diffs

Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
dnsmasq (2.80-1ubuntu4) focal; urgency=medium

  * Apply ab73a746a0d6fcac2e682c5548eeb87fb9c9c82e from upstream GIT to fix
    build error against nettle 3.5. Closes: #940985; thanks to Andreas
    Metzler <email address hidden>.

 -- Steve Langasek <email address hidden>  Mon, 04 Nov 2019 17:28:11 -0800
Superseded in focal-proposed
dnsmasq (2.80-1ubuntu3) focal; urgency=medium

  * No-change rebuild against libnettle7

 -- Steve Langasek <email address hidden>  Thu, 31 Oct 2019 22:10:11 +0000

Available diffs

Superseded in focal-release
Obsolete in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
dnsmasq (2.80-1ubuntu2) eoan; urgency=medium

  * Fix FTBFS in eoan due to glibc 2.30 SIOCGSTAMP changes (LP: #1843430)

 -- Christian Ehrhardt <email address hidden>  Tue, 10 Sep 2019 15:00:04 +0200

Available diffs

Superseded in eoan-release
Obsolete in disco-release
Deleted in disco-proposed (Reason: moved to release)
dnsmasq (2.80-1ubuntu1) disco; urgency=medium

  * Revert upstream commit 3af747d94bae66a2a1b564b2d04161a78159a434:
    "Do unsolicited RAs for interfaces which appear after dnsmasq startup."
    - it caused a regression in the network-manager autopkgtests.

 -- Julian Andres Klode <email address hidden>  Tue, 08 Jan 2019 16:34:58 +0100

Available diffs

Superseded in disco-release
Deleted in disco-proposed (Reason: moved to release)
dnsmasq (2.80-1) unstable; urgency=low

   * New upstream. (closes: #837602) (closes: #794640) (closes: #794636)
   * Close old bugs, long agp fixed. (closes: #802845) (closes: #754299)
   * Provide usr/lib/tmpfiles.d/dnsmasq.conf. (closes: #872396)
   * Run restorecon on /run/dnsmasq for SE Linux. (closes: #872397)

 -- Simon Kelley <email address hidden>  Mon, 17 Sep 2018 23:11:25 +0000

Available diffs

Superseded in xenial-updates
Superseded in xenial-security
dnsmasq (2.75-1ubuntu0.16.04.5) xenial-security; urgency=medium

  * trusty-anchors.conf: Update DNSSEC trust anchors
    - 05da782f8f45933915af0ef3cc1ba35e31d20c59

 -- Marc Deslauriers <email address hidden>  Thu, 12 Jul 2018 09:39:42 -0400
Superseded in disco-release
Obsolete in cosmic-release
Published in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
dnsmasq (2.79-1) unstable; urgency=low

   * New upstream. (closes: #888200)
   * Fix trust-anchor regex in init script. (closes: #884347)
   * Fix exit code for dhcp_release6 (closes: #833596)
   * Add project homepage to control file. (closes: #887764)
   * New binary package dnsmasq-base-lua, includes Lua support.
   * Remove hardwired shlibs dependency for libnettle 3.3 and
     fix code to avoid ABI breakage as long as compiled against
     libnettle 3.4 or later. (closes: #891315)

 -- Simon Kelley <email address hidden>  Fri, 16 Feb 2018 19:54:22 +0000

Available diffs

Superseded in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
dnsmasq (2.78-3) unstable; urgency=high

   * Make failure of pidfile chown a warning. (closes: #889857)
  
 -- Simon Kelley <email address hidden>  Thu, 8 Feb 2018 21:26:30 +0000

Available diffs

Superseded in bionic-proposed
dnsmasq (2.78-2) unstable; urgency=high

   * Change ownership of pid file, to keep systemd happy. (closes: #889336)
  
 -- Simon Kelley <email address hidden>  Tue, 6 Feb 2018 17:21:30 +0000
Published in precise-updates
Published in precise-security
dnsmasq (2.59-4ubuntu0.4) precise-security; urgency=medium

  * REGRESSION UPDATE: a offset error passed in the last update that cause a
    regresion in dnsmasq this update fix this issue.

 -- <email address hidden> (Leonidas S. Barbosa)  Tue, 02 Jan 2018 21:22:45 -0300
Obsolete in zesty-updates
Deleted in zesty-proposed (Reason: moved to -updates)
dnsmasq (2.76-5ubuntu0.2) zesty; urgency=medium

  * Fix replying prematurely if one of many servers replies REFUSED
    (LP: #1726017) by adding an upstream patche.
    - 2.77: 68f6312d4b: Stop treating SERVFAIL as a successful response from
      upstream servers.

 -- Christian Ehrhardt <email address hidden>  Mon, 23 Oct 2017 08:48:44 +0200
Superseded in xenial-updates
Deleted in xenial-proposed (Reason: moved to -updates)
dnsmasq (2.75-1ubuntu0.16.04.4) xenial; urgency=medium

  * Fix replying prematurely if one of many servers replies REFUSED
    (LP: #1726017) by adding two upstream patches.
    - 2.76: 4ace25c5d6: Treat REFUSED (not SERVFAIL) as an unsuccessful
      upstream response
    - 2.77: 68f6312d4b: Stop treating SERVFAIL as a successful response from
      upstream servers.

 -- Christian Ehrhardt <email address hidden>  Mon, 23 Oct 2017 08:32:22 +0200
Superseded in bionic-release
Obsolete in artful-release
Deleted in artful-proposed (Reason: moved to release)
dnsmasq (2.78-1) unstable; urgency=high

   * New upstream.
     Security fixes for CVE-2017-13704  (closes: #877102)
     Security fixes for CVE-2017-14491 - CVE-2017-14496 inclusive.	

 -- Simon Kelley <email address hidden>  Sun, 29 Sep 2017 21:34:00 +0000

Available diffs

Published in trusty-updates
Published in trusty-security
dnsmasq (2.68-1ubuntu0.2) trusty-security; urgency=medium

  * SECURITY UPDATE: add fixes to correct multiple security issues
    - CVE-2017-14491 DNS heap buffer overflow.
    - CVE-2017-14492, DHCPv6 RA heap overflow.
    - CVE-2017-14493, DHCPv6 - Stack buffer overflow.
    - CVE-2017-14494, Infoleak handling DHCPv6 forwarded requests.
    - CVE-2017-14495, OOM in DNS response creation.
    - CVE-2017-14496, Integer underflow in DNS response creation.

 -- Marc Deslauriers <email address hidden>  Tue, 26 Sep 2017 18:01:37 -0400
Superseded in xenial-updates
Superseded in xenial-security
dnsmasq (2.75-1ubuntu0.16.04.3) xenial-security; urgency=medium

  * SECURITY UPDATE: add fixes to correct multiple security issues
    - CVE-2017-14491 DNS heap buffer overflow.
    - CVE-2017-14492, DHCPv6 RA heap overflow.
    - CVE-2017-14493, DHCPv6 - Stack buffer overflow.
    - CVE-2017-14494, Infoleak handling DHCPv6 forwarded requests.
    - CVE-2017-14495, OOM in DNS response creation.
    - CVE-2017-14496, Integer underflow in DNS response creation.

 -- Marc Deslauriers <email address hidden>  Tue, 26 Sep 2017 17:42:14 -0400
Superseded in zesty-updates
Obsolete in zesty-security
dnsmasq (2.76-5ubuntu0.1) zesty-security; urgency=medium

  * SECURITY UPDATE: add fixes to correct multiple security issues
    - CVE-2017-14491 DNS heap buffer overflow.
    - CVE-2017-14492, DHCPv6 RA heap overflow.
    - CVE-2017-14493, DHCPv6 - Stack buffer overflow.
    - CVE-2017-14494, Infoleak handling DHCPv6 forwarded requests.
    - CVE-2017-14495, OOM in DNS response creation.
    - CVE-2017-14496, Integer underflow in DNS response creation.

 -- Marc Deslauriers <email address hidden>  Tue, 26 Sep 2017 14:01:49 -0400
Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
dnsmasq (2.77-2) unstable; urgency=low

   * Improve sed regexp for parsing root.ds.

 -- Simon Kelley <email address hidden>  Mon, 5 Jun 2017 20:46:32 +0000

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
dnsmasq (2.77-1) unstable; urgency=low

   * New upstream.
   * Don't register as a resolvconf source when config file
     includes port=0 to disable DNS.
   * Handle gratuitous format change in /usr/share/dns/root.ds
     (closes: #858506) (closes: #860064)
   * Add lsb-base dependancy.

 -- Simon Kelley <email address hidden>  Tue, 11 Apr 2017 14:19:20 +0000

Available diffs

Obsolete in yakkety-updates
Deleted in yakkety-proposed (Reason: moved to -updates)
dnsmasq (2.76-4ubuntu0.1) yakkety; urgency=medium

  * Add two upstream patches to fix binding to an interface being
    destroyed and recreated. LP: #1639776.
      + 2675f2061525bc954be14988d64384b74aa7bf8b
      + 16800ea072dd0cdf14d951c4bb8d2808b3dfe53d

 -- Nishanth Aravamudan <email address hidden>  Tue, 28 Mar 2017 10:36:48 -0700
Superseded in xenial-updates
Deleted in xenial-proposed (Reason: moved to -updates)
dnsmasq (2.75-1ubuntu0.16.04.2) xenial; urgency=medium

  * Add two upstream patches to fix binding to an interface being
    destroyed and recreated. LP: #1639776.
      + 2675f2061525bc954be14988d64384b74aa7bf8b
      + 16800ea072dd0cdf14d951c4bb8d2808b3dfe53d

 -- Nishanth Aravamudan <email address hidden>  Mon, 27 Mar 2017 17:22:13 -0700
Superseded in artful-release
Obsolete in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
dnsmasq (2.76-5) unstable; urgency=medium

  * Nail libnettle dependency to avoid ABI incompatibility.
    (closes: #846642)

 -- Simon Kelley <email address hidden>  Sat, 13 Aug 2016 21:43:10 +0000

Available diffs

Superseded in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
dnsmasq (2.76-4.1) unstable; urgency=medium

  * Non-maintainer upload.
  * Add two upstream patches to fix binding to an interface being
    destroyed and recreated. Closes: #834722.
      + 2675f2061525bc954be14988d64384b74aa7bf8b
      + 16800ea072dd0cdf14d951c4bb8d2808b3dfe53d

 -- Vincent Bernat <email address hidden>  Sat, 26 Nov 2016 20:15:34 +0100
175 of 160 results