Since the package referred to in this bug is in universe or multiverse,
it is community maintained. It is clear that Ubuntu 6.06 is not going to
get an update for this almost 3 year old bug, so I am marking the task
as "Won't Fix". Please feel free to reopen if you would like to post a
debdiff to f
The 18 month support period for Gutsy Gibbon 7.10 has reached its end of life -
http://www.ubuntu.com/news/ubuntu-7.10-eol . As a result, we are closing the
Gutsy task.
** Changed in: dnsmasq (Ubuntu Gutsy)
Status: Confirmed => Won't Fix
--
dnsmasq might be vulnerable to recent DNS spoofi
Ubuntu Feisty Fawn is no longer supported, so a SRU will not be issued
for this release. Marking Feisty as Won't Fix.
** Changed in: dnsmasq (Ubuntu Feisty)
Status: Confirmed => Won't Fix
--
dnsmasq might be vulnerable to recent DNS spoofing issue
https://bugs.launchpad.net/bugs/247598
Yo
** Changed in: dnsmasq (Ubuntu Dapper)
Status: New => Confirmed
** Changed in: dnsmasq (Ubuntu Feisty)
Status: New => Confirmed
** Changed in: dnsmasq (Ubuntu Gutsy)
Status: New => Confirmed
--
dnsmasq might be vulnerable to recent DNS spoofing issue
https://bugs.launchpad.
http://www.ubuntu.com/usn/usn-627-1
** Changed in: dnsmasq (Ubuntu Hardy)
Status: In Progress => Fix Released
--
dnsmasq might be vulnerable to recent DNS spoofing issue
https://bugs.launchpad.net/bugs/247598
You received this bug notification because you are a member of Ubuntu
Server Tea
** Changed in: dnsmasq (Ubuntu Hardy)
Status: New => In Progress
--
dnsmasq might be vulnerable to recent DNS spoofing issue
https://bugs.launchpad.net/bugs/247598
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to dnsmasq in ubuntu.
New debdiff with an additional check recommended by upstream :
"In the function nl_routechange() at the end of src/netlink.c, a check needs to
be added to ensure that daemon->srv_save->sfd is non-NULL. This avoids a
segfault. If it is NULL, just returning from the function is fine."
I checked th
This bug was fixed in the package dnsmasq - 2.43-1ubuntu1
---
dnsmasq (2.43-1ubuntu1) intrepid; urgency=low
* Merge from debian unstable (LP: #247598), remaining changes:
- TearDown spec recommendations in debian/postinst and debian/init
- debian/control: Updated maintaine
The same without the merge-o-matic whack-my-changelog-whitespaces
feature
** Attachment added: "dnsmasq_2.43-1ubuntu1.debdiff"
http://launchpadlibrarian.net/16022916/dnsmasq_2.43-1ubuntu1.debdiff
--
dnsmasq might be vulnerable to recent DNS spoofing issue
https://bugs.launchpad.net/bugs/24759
Merge from latest Debian unstable version, for fixing this in intrepid.
Remaining changes:
- TearDown spec recommendations in debian/postinst and debian/init
- debian/control: Updated maintainer to match DebianMaintainerField
** Attachment added: "dnsmasq_2.43-1ubuntu1.debdiff"
http://launchpad
Debdiff for the security update in hardy
This is based on Simon's patch but applied over 2.41 (minus the version
change in config.h, plus the fix_fd call in network.c). Not heavily
tested.
** Attachment added: "dnsmasq_2.41-2ubuntu2.1.debdiff"
http://launchpadlibrarian.net/16015512/dnsmasq_2.4
** Changed in: dnsmasq (Debian)
Status: Unknown => Fix Released
--
dnsmasq might be vulnerable to recent DNS spoofing issue
https://bugs.launchpad.net/bugs/247598
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to dnsmasq in ubuntu.
-
** Bug watch added: Debian Bug tracker #490123
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123
** Also affects: dnsmasq (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123
Importance: Unknown
Status: Unknown
--
dnsmasq might be vulnerable to recent DNS sp
** Attachment added: "randsock-diff"
http://launchpadlibrarian.net/15963273/randsock-diff
** Visibility changed to: Public
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-1447
--
dnsmasq might be vulnerable to recent DNS spoofing issue
https://bugs.launchpad.net/bugs/2
14 matches
Mail list logo