Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered that Dnsmasq icorrectly handled validating DNSSEC messages. A remote attacker could possibly use this issue to cause Dnsmasq to consume resources, leading to a denial of service. (CVE-2023-50387)
It was discovered that Dnsmasq incorrectly handled preparing an NSEC3 closest encloser proof. A remote attacker could possibly use this issue to cause Dnsmasq to consume resources, leading to a denial of service. (CVE-2023-50868)
It was discovered that Dnsmasq incorrectly set the maximum EDNS.0 UDP packet size as required by DNS Flag Day 2020. This issue only affected Ubuntu 23.10. (CVE-2023-28450)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.90-0ubuntu0.20.04.1", "binary_name": "dnsmasq" }, { "binary_version": "2.90-0ubuntu0.20.04.1", "binary_name": "dnsmasq-base" }, { "binary_version": "2.90-0ubuntu0.20.04.1", "binary_name": "dnsmasq-base-lua" }, { "binary_version": "2.90-0ubuntu0.20.04.1", "binary_name": "dnsmasq-utils" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.90-0ubuntu0.22.04.1", "binary_name": "dnsmasq" }, { "binary_version": "2.90-0ubuntu0.22.04.1", "binary_name": "dnsmasq-base" }, { "binary_version": "2.90-0ubuntu0.22.04.1", "binary_name": "dnsmasq-base-lua" }, { "binary_version": "2.90-0ubuntu0.22.04.1", "binary_name": "dnsmasq-utils" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.90-0ubuntu0.23.10.1", "binary_name": "dnsmasq" }, { "binary_version": "2.90-0ubuntu0.23.10.1", "binary_name": "dnsmasq-base" }, { "binary_version": "2.90-0ubuntu0.23.10.1", "binary_name": "dnsmasq-base-lua" }, { "binary_version": "2.90-0ubuntu0.23.10.1", "binary_name": "dnsmasq-utils" } ] }