Two new CVEs were revealed related to DNSSEC support in dnsmasq. A specially crafted record can generate a DoS against dnsmasq, causing it to exhaust its resources.
While dnsmasq 2.90 was released with a fix, initial reports indicate that it causes other issues, breaking DNSSEC for some legitimate sites.
I intend to wait until more info can be gathered about these new issues, so in the meantime if you are worried about these two issues, I recommend disabling DNSSEC for now. Once more info (and a solution to the new issues) become available, I will look into updating to dnsmasq 2.90 for both 386 and 388. That will be a bit tricky for 388 since Asus has merged a mid-release version in the latest GPL, and I have no idea if it only contains pure dnsmasq code or if it also contains Asus-specific changes. I will need to walk through each commit one by one after 2.89 to determine at which commit Asus merged the upstream code.
While dnsmasq 2.90 was released with a fix, initial reports indicate that it causes other issues, breaking DNSSEC for some legitimate sites.
I intend to wait until more info can be gathered about these new issues, so in the meantime if you are worried about these two issues, I recommend disabling DNSSEC for now. Once more info (and a solution to the new issues) become available, I will look into updating to dnsmasq 2.90 for both 386 and 388. That will be a bit tricky for 388 since Asus has merged a mid-release version in the latest GPL, and I have no idea if it only contains pure dnsmasq code or if it also contains Asus-specific changes. I will need to walk through each commit one by one after 2.89 to determine at which commit Asus merged the upstream code.