First published: Thu Apr 20 2023(Updated: )
It was discovered that Dnsmasq was sending large DNS messages over UDP, possibly causing transmission failures due to IP fragmentation. This update lowers the default maximum size of DNS messages to improve transmission reliability over UDP.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/dnsmasq-base | <2.86-1.1ubuntu2.1 | 2.86-1.1ubuntu2.1 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/dnsmasq-base | <2.86-1.1ubuntu0.3 | 2.86-1.1ubuntu0.3 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/dnsmasq-base | <2.80-1.1ubuntu1.7 | 2.80-1.1ubuntu1.7 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/dnsmasq-base | <2.79-1ubuntu0.7 | 2.79-1ubuntu0.7 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/dnsmasq-base | <2.79-1ubuntu0.16.04.1+esm2 | 2.79-1ubuntu0.16.04.1+esm2 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/dnsmasq-base | <2.68-1ubuntu0.2+esm2 | 2.68-1ubuntu0.2+esm2 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6034-1 addresses a potential issue with Dnsmasq that could lead to transmission failures due to large DNS messages.
To fix USN-6034-1, update the dnsmasq-base package to a patched version such as 2.86-1.1ubuntu2.1 for Ubuntu 22.10.
USN-6034-1 affects Ubuntu versions 14.04, 16.04, 18.04, 20.04, 22.04, and 22.10 with specific dnsmasq-base versions.
If USN-6034-1 is not addressed, users may experience unreliable DNS message transmission and service interruptions.
Yes, the recommended versions to upgrade to include dnsmasq-base 2.86-1.1ubuntu2.1 for Ubuntu 22.10.