package/dnsmasq: security bump to 2.83
authorNicolas Cavallari <nicolas.cavallari@green-communications.fr>
Tue, 19 Jan 2021 18:09:08 +0000 (19:09 +0100)
committerPeter Korsgaard <peter@korsgaard.com>
Tue, 19 Jan 2021 19:18:25 +0000 (20:18 +0100)
commit5cd5d85cdab72b2e62d1daca6311f480a7e68546
tree2fc7679c94332cc9a9d55d468a7f990b56b4fdff
parenta20a86d7f6571849419f8920f0d1c56bcc4ec9c2
package/dnsmasq: security bump to 2.83

From the annoucement:
http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2021q1/014599.html

"There are broadly two sets of problems. The first is subtle errors in
dnsmasq's protections against the chronic weakness of the DNS protocol
to cache-poisoning attacks; the Birthday attack, Kaminsky, etc. [...]

[...] the second set of errors is a good old fashioned buffer overflow
in dnsmasq's DNSSEC code."

Fixes CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25684,
      CVE-2020-25685, CVE-2020-25686 and CVE-2020-25687

Details: https://www.jsof-tech.com/disclosures/dnspooq

Signed-off-by: Nicolas Cavallari <nicolas.cavallari@green-communications.fr>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/dnsmasq/dnsmasq.hash
package/dnsmasq/dnsmasq.mk