- Update to 2.85:

* Fix problem with DNS retries in 2.83/2.84.
  * Tweak sort order of tags in get-version.
  * Avoid treating a --dhcp-host which has an IPv6 address as
    eligible for use with DHCPv4 on the grounds that it has
    no address, and vice-versa.
  * Add --dynamic-host option: A and AAAA records which take their
    network part from the network of a local interface. Useful
    for routers with dynamically prefixes.
  * Teach --bogus-nxdomain and --ignore-address to take an IPv4
    subnet.
  * CVE-2021-3448, bsc#1183709: Use random source ports where
    possible if source addresses/interfaces in use.
  * Change the method of allocation of random source ports for DNS.
  * Scale the size of the DNS random-port pool based on the
    value of the --dns-forward-max configuration.
  * Tweak TFTP code to check sender of all received packets, as
    specified in RFC 1350 para 4.

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=132
This commit is contained in:
Reinhard Max 2021-04-19 21:50:31 +00:00 committed by Git OBS Bridge
parent 822e2ef139
commit 755bed9cef
6 changed files with 42 additions and 20 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:603195c64b73137609b07e1024ae0b37f652b2f5fe467dce66985b3d1850050c
size 514216

View File

@ -1,16 +0,0 @@
-----BEGIN PGP SIGNATURE-----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=v/QT
-----END PGP SIGNATURE-----

3
dnsmasq-2.85.tar.xz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:ad98d3803df687e5b938080f3d25c628fe41c878752d03fbc6199787fee312fa
size 518316

16
dnsmasq-2.85.tar.xz.asc Normal file
View File

@ -0,0 +1,16 @@
-----BEGIN PGP SIGNATURE-----
iQIzBAABCAAdFiEE1urL1u5GuDQkjRESFc3aauGRNaIFAmBuGPsACgkQFc3aauGR
NaIg6A//Xfcu62aItiHf/jTeFHUSqHrdqanDqLRWSpgdeKO2adk+s66p5CqVHC8K
JfxPo6eTUj8uX53Idy5oiwUz4d40iiOjfxHs4Nme0ozyIAHGw/Tfwx7/+NV882vi
+rtqhjF83dRsnqIR95FD17tVI+cR0sq6XKzwBtPicjmPt79sQ2UtkBo7I+IS9B5g
o+i21gGYm34EgY6EavveWfGkKgJLz+cF59h4i16lc1eRGNsy5clURDxiJ65Zz0zb
ZARLudEclbFNdoUu/4idmOUhZCGWrqf9o+rQDYW3vN85saxCPbTChqqy1VC6OBnX
VLN3cAJlk1hS5X0HzewhXkOqulzjg81KWRQ8EYATdOQP7u6apv4q87hnmr+uL9E8
0VZ3ECyhH7n6qNXfqNS2Fp3Yp0sm1hgRy+6bu/IgVTPs/Ro22HqTiw5YXZQkPMbe
A4acAep59nIV9dEB5DYF1N0S0P6OcVtUsZAFlGS1cD0owFuI44W/lg8w9xA9gyJv
uqZvZqkQDM8bi9zJ2d7fjf65pjS+7S9ISxDoPHp34lLMB7D/rAuW8GVBkL1KxMWb
sRHIBDKM01CXZeRBlbxAYHlH7s2QehRk/t57ksTmPtT3IAVMSajEG0+1YElUGg8s
2gqLtCLdmB6Lwl4RFripSERvPzYOAsd8DiqDL9wYOECBStUGuEw=
=W3WM
-----END PGP SIGNATURE-----

View File

@ -1,3 +1,25 @@
-------------------------------------------------------------------
Mon Apr 19 20:46:49 UTC 2021 - Reinhard Max <max@suse.com>
- Update to 2.85:
* Fix problem with DNS retries in 2.83/2.84.
* Tweak sort order of tags in get-version.
* Avoid treating a --dhcp-host which has an IPv6 address as
eligible for use with DHCPv4 on the grounds that it has
no address, and vice-versa.
* Add --dynamic-host option: A and AAAA records which take their
network part from the network of a local interface. Useful
for routers with dynamically prefixes.
* Teach --bogus-nxdomain and --ignore-address to take an IPv4
subnet.
* CVE-2021-3448, bsc#1183709: Use random source ports where
possible if source addresses/interfaces in use.
* Change the method of allocation of random source ports for DNS.
* Scale the size of the DNS random-port pool based on the
value of the --dns-forward-max configuration.
* Tweak TFTP code to check sender of all received packets, as
specified in RFC 1350 para 4.
-------------------------------------------------------------------
Mon Feb 8 22:37:20 UTC 2021 - Dirk Müller <dmueller@suse.com>

View File

@ -22,7 +22,7 @@
%bcond_without tftp_user_package
%endif
Name: dnsmasq
Version: 2.84
Version: 2.85
Release: 0
Summary: DNS Forwarder and DHCP Server
License: GPL-2.0-only OR GPL-3.0-only