Commit Graph

196 Commits

Author SHA256 Message Date
Ana Guerrero
a8259ced12 Accepting request 1179330 from network
Added another bug reference to the latest changes entry.

  * CVE-2023-49441, bsc#1226091: integer overflow via forward_query

OBS-URL: https://build.opensuse.org/request/show/1179330
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=97
2024-06-09 18:20:06 +00:00
Reinhard Max
7fce638a33 * CVE-2023-49441, bsc#1226091: integer overflow via forward_query
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=168
2024-06-07 14:30:52 +00:00
Ana Guerrero
2f79db001b Accepting request 1148852 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1148852
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=96
2024-02-23 15:40:30 +00:00
Reinhard Max
72f6426e30 OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=166 2024-02-16 12:46:35 +00:00
Reinhard Max
0cc8ed3dc1 - update to 2.90:
* CVE-2023-50387, CVE-2023-50868, bsc#1219823, bsc#1219826:
    Denial Of Service while trying to validate specially crafted
    DNSSEC responses
  * Fix reversion in --rev-server introduced in 2.88 which caused
    breakage if the prefix length is not exactly divisible by 8
    (IPv4) or 4 (IPv6).
  * Fix possible SEGV when there server(s) for a particular domain
    are configured, but no server which is not qualified for a
    particular domain.
  * Set the default maximum DNS UDP packet sice to 1232.
    Obsoletes: dnsmasq-CVE-2023-28450.patch
  * Add --no-dhcpv4-interface and --no-dhcpv6-interface for better
    control over which inetrfaces are providing DHCP service.
  * Fix issue with stale caching
  * Add configurable caching for arbitrary RR-types.
  * Add --filter-rr option, to filter arbitrary RR-types.

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=165
2024-02-14 18:04:45 +00:00
Ana Guerrero
ee7ad3ae48 Accepting request 1126658 from network
OBS-URL: https://build.opensuse.org/request/show/1126658
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=95
2023-11-16 19:27:12 +00:00
Reinhard Max
22e8185410 Accepting request 1117613 from home:kukuk:branches:network
- SLP got dropped, remove config (bsc#1214884)

OBS-URL: https://build.opensuse.org/request/show/1117613
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=163
2023-11-15 14:20:46 +00:00
Dominique Leuenberger
a543d4ad0b Accepting request 1087210 from network
OBS-URL: https://build.opensuse.org/request/show/1087210
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=94
2023-05-16 12:15:54 +00:00
Reinhard Max
4d358c4945 Accepting request 1087003 from home:gmbr3:Active
- Correct rundir from /var/run to /run for pid file

OBS-URL: https://build.opensuse.org/request/show/1087003
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=161
2023-05-15 11:30:28 +00:00
Dominique Leuenberger
cb7f45821c Accepting request 1082695 from network
- bsc#1209358, CVE-2023-28450, dnsmasq-CVE-2023-28450.patch:
  default maximum EDNS.0 UDP packet size should be 1232

OBS-URL: https://build.opensuse.org/request/show/1082695
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=93
2023-04-26 15:24:15 +00:00
Reinhard Max
5812a696e5 - bsc#1209358, CVE-2023-28450, dnsmasq-CVE-2023-28450.patch:
default maximum EDNS.0 UDP packet size should be 1232

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=159
2023-04-25 08:33:07 +00:00
Dominique Leuenberger
ee1ce84cab Accepting request 1066370 from network
Added bug reference

OBS-URL: https://build.opensuse.org/request/show/1066370
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=92
2023-02-17 15:43:57 +00:00
Reinhard Max
34ee2bc9ad it down. (boo#1207174)
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=157
2023-02-17 11:54:59 +00:00
Dominique Leuenberger
ae43cc1797 Accepting request 1063496 from network
OBS-URL: https://build.opensuse.org/request/show/1063496
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=91
2023-02-07 17:48:19 +00:00
Reinhard Max
632e70dcde Accepting request 1063373 from home:polslinux:branches:network
- update to 2.89:
  * Fix bug introduced in 2.88 (commit fe91134b) which can result
    in corruption of the DNS cache internal data structures and
    logging of "cache internal error". This has only been seen
    in one place in the wild, and it took considerable effort
    to even generate a test case to reproduce it, but there's
    no way to be sure it won't strike, and the effect is to break
    the cache badly. Installations with DNSSEC enabled are more
    likely to see the problem, but not running DNSSEC does not
    guarantee that it won't happen. Thanks to Timo van Roermund
    for reporting the bug and for his great efforts in chasing
    it down.
- remove no longer needed rpmlintrc filters

OBS-URL: https://build.opensuse.org/request/show/1063373
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=155
2023-02-06 17:47:21 +00:00
Dominique Leuenberger
92c6477b69 Accepting request 1045478 from network
OBS-URL: https://build.opensuse.org/request/show/1045478
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=90
2022-12-28 09:54:27 +00:00
Reinhard Max
ee2f248c1a Accepting request 1044373 from home:dirkmueller:Factory
- update to 2.88:
  * Fix bug in --dynamic-host when an interface has /16 IPv4
  * address.
  * Add --fast-dns-retry option. This gives dnsmasq the ability
    to originate retries for upstream DNS queries itself, rather
    than relying on the downstream client. This is most useful
    when doing DNSSEC over unreliable upstream networks. It comes
    with some cost in memory usage and network bandwidth.
  * Add --use-stale-cache option. When set, if a DNS name exists
    in the cache, but its time-to-live has expired, dnsmasq will
    return the data anyway.
  * handle removal of whole files or entries within files.

OBS-URL: https://build.opensuse.org/request/show/1044373
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=153
2022-12-27 10:20:23 +00:00
Dominique Leuenberger
70d707bb81 Accepting request 1034136 from network
OBS-URL: https://build.opensuse.org/request/show/1034136
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=89
2022-11-08 09:53:18 +00:00
Reinhard Max
33d1dd7eac Accepting request 1031298 from home:dirkmueller:Factory
- update to 2.87 (bsc#1197872, CVE-2022-0934):
  * Allow arbitrary prefix lengths in --rev-server and
    --domain=....,local
  * Replace --address=/#/..... functionality which got
    missed in the 2.86 domain search rewrite.
  * Add --nftset option, like --ipset but for the newer nftables.
  * Add --filter-A and --filter-AAAA options, to remove IPv4 or IPv6
    addresses from DNS answers.
  * Fix crash doing netbooting when --port is set to zero
    to disable the DNS server. Thanks to Drexl Johannes
    for the bug report.
  * Generalise --dhcp-relay. Sending via broadcast/multicast is
    now supported for both IPv4 and IPv6 and the configuration
    syntax made easier (but backwards compatible).
  * Add snooping of IPv6 prefix-delegations to the DHCP-relay system.
  * Finesse parsing of --dhcp-remoteid and --dhcp-subscrid. To be treated
    as hex, the pattern must consist of only hex digits AND contain
    at least one ':'. Thanks to Bengt-Erik Sandstrom who tripped
    over a pattern consisting of a decimal number which was interpreted
    surprisingly.
  * Include client address in TFTP file-not-found error reports.
    Thanks to Stefan Rink for the initial patch, which has been
    re-worked by me (srk). All bugs mine.
  * Note in manpage the change in behaviour of -address. This behaviour
    actually changed in v2.86, but was undocumented there. From 2.86 on,
    (eg) --address=/example.com/1.2.3.4 ONLY applies to A queries. All other
    types of query will be sent upstream. Pre 2.86, that would catch the
    whole example.com domain and queries for other types would get
    a local NODATA answer. The pre-2.86 behaviour is still available,
    by configuring --address=/example.com/1.2.3.4 --local=/example.com/

OBS-URL: https://build.opensuse.org/request/show/1031298
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=151
2022-11-07 10:18:14 +00:00
Dominique Leuenberger
a38c20861b Accepting request 1004570 from network
OBS-URL: https://build.opensuse.org/request/show/1004570
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=88
2022-09-20 17:23:03 +00:00
0e41fdbd5f Accepting request 1002291 from home:gmbr3:Active
- Ensure the dnsmasq user's group is used
- Remove nogroup requirement

OBS-URL: https://build.opensuse.org/request/show/1002291
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=149
2022-09-19 06:55:22 +00:00
Dominique Leuenberger
23ec442c57 Accepting request 982371 from network
OBS-URL: https://build.opensuse.org/request/show/982371
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=87
2022-07-08 12:01:29 +00:00
37bc9b79aa Accepting request 981335 from home:gmbr3:Active
- Move the dbus-1 system.d file to /usr (bsc#1200344)

OBS-URL: https://build.opensuse.org/request/show/981335
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=147
2022-06-13 08:25:42 +00:00
Dominique Leuenberger
83a5bd8676 Accepting request 969348 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/969348
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=86
2022-04-14 15:23:28 +00:00
Reinhard Max
e3d0db2cf5 - bsc#1197872, CVE-2022-0934, dnsmasq-CVE-2022-0934.patch:
Heap use after free in dhcp6_no_relay

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=145
2022-04-05 07:17:25 +00:00
Dominique Leuenberger
672de53781 Accepting request 933804 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/933804
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=85
2021-11-26 23:50:56 +00:00
Dominique Leuenberger
c151cb5315 Accepting request 932271 from network
- bsc#1192529, dnsmasq-resolv-conf.patch:
  Fix a segfault when re-reading an empty resolv.conf
- Remove "nogroup" membership from the dnsmasq user.
- Use systemd-sysusers from 15.3 onwards

OBS-URL: https://build.opensuse.org/request/show/932271
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=84
2021-11-20 21:47:53 +00:00
Reinhard Max
e863251880 OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=144 2021-11-18 15:52:28 +00:00
Reinhard Max
c177936b94 - bsc#1192529, dnsmasq-resolv-conf.patch:
Fix a segfault when re-reading an empty resolv.conf
- Remove "nogroup" membership from the dnsmasq user.

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=143
2021-11-18 14:11:14 +00:00
Reinhard Max
d5b765a964 Accepting request 928184 from home:gmbr3:Active
- Use systemd-sysusers from 15.3 onwards

OBS-URL: https://build.opensuse.org/request/show/928184
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=142
2021-11-18 13:53:24 +00:00
Dominique Leuenberger
25af15f8e3 Accepting request 921143 from network
- jsc#SLE-17936: Sync this state from Factory to SLE-15-SP1.
- SLE bugs that got fixed upstream between 2.79 and 2.86, but for
  which we need to keep references when syncing:
  * bsc#1176076: dnsmasq-servfail.patch
  * bsc#1156543: dnsmasq-siocgstamp.patch
  * bsc#1138743: dnsmasq-cache-size.patch
  * bsc#1076958: CVE-2017-15107, dnsmasq-CVE-2017-15107.patch 
  * bsc#1180914: Open inotify socket only when used.
  * removed dnsmasq-dnspooq.patch
- bsc#1173646: Set --local-service by default.

- Update to 2.86:
  * Handle DHCPREBIND requests in the DHCPv6 server code.
  * Fix bug which caused dnsmasq to lose track of processes forked
    to handle TCP DNS connections under heavy load.
  * Major rewrite of the DNS server and domain handling code. This
    should be largely transparent, but it drastically improves
    performance and reduces memory foot-print when configuring
    large numbers of domains.
  * Revise resource handling for number of concurrent DNS queries.
  * Improve efficiency of DNSSEC.
  * Connection track mark based DNS query filtering.
  * Allow smaller than 64 prefix lengths in synth-domain, with
    caveats.
    --synth-domain=1234:4567::/56,example.com is now valid.
  * Make domains generated by --synth-domain appear in replies
    when in authoritative mode.
  * Ensure CAP_NET_ADMIN capability is available when conntrack
    is configured.
  * When --dhcp-hostsfile --dhcp-optsfile and --addn-hosts are

OBS-URL: https://build.opensuse.org/request/show/921143
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=83
2021-09-26 19:48:37 +00:00
Reinhard Max
f4508ec1d0 OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=141 2021-09-23 12:06:42 +00:00
Reinhard Max
029f71cf1d OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=140 2021-09-23 12:02:11 +00:00
Reinhard Max
0c6831c53a OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=139 2021-09-23 09:22:08 +00:00
Reinhard Max
bcf4390ff2 - SLE bugs that got fixed upstream between 2.79 and 2.86, but for
which we need to keep references when syncing Factory to SLE:
  * bsc#1176076: dnsmasq-servfail.patch
  * bsc#1156543: dnsmasq-siocgstamp.patch
  * bsc#1138743: dnsmasq-cache-size.patch
  * bsc#1076958: CVE-2017-15107, dnsmasq-CVE-2017-15107.patch

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=138
2021-09-23 08:59:05 +00:00
Reinhard Max
049fbc620b - Update to 2.86:
* Handle DHCPREBIND requests in the DHCPv6 server code.
  * Fix bug which caused dnsmasq to lose track of processes forked
    to handle TCP DNS connections under heavy load.
  * Major rewrite of the DNS server and domain handling code. This
    should be largely transparent, but it drastically improves
    performance and reduces memory foot-print when configuring
    large numbers of domains.
  * Revise resource handling for number of concurrent DNS queries.
  * Improve efficiency of DNSSEC.
  * Connection track mark based DNS query filtering.
  * Allow smaller than 64 prefix lengths in synth-domain, with
    caveats.
    --synth-domain=1234:4567::/56,example.com is now valid.
  * Make domains generated by --synth-domain appear in replies
    when in authoritative mode.
  * Ensure CAP_NET_ADMIN capability is available when conntrack
    is configured.
  * When --dhcp-hostsfile --dhcp-optsfile and --addn-hosts are
    given a directory as argument, define the order in which files
    within that directory are read (alphabetical order of filename).
- Added hardening to systemd service(s) (bsc#1181400).

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=137
2021-09-17 11:27:06 +00:00
Reinhard Max
dc54688f33 Accepting request 918936 from home:jsegitz:branches:systemdhardening:network
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort

OBS-URL: https://build.opensuse.org/request/show/918936
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=136
2021-09-17 09:40:15 +00:00
Dominique Leuenberger
36392b1f56 Accepting request 904175 from network
OBS-URL: https://build.opensuse.org/request/show/904175
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=82
2021-07-07 16:29:47 +00:00
Reinhard Max
253903d350 Accepting request 899810 from home:gmbr3:Active
- Add now working CONFIG parameter to sysusers generator

OBS-URL: https://build.opensuse.org/request/show/899810
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=135
2021-07-05 13:31:21 +00:00
Reinhard Max
05adc3fbcf Accepting request 896893 from home:gmbr3:Active
- Change to using systemd-sysusers on TW

OBS-URL: https://build.opensuse.org/request/show/896893
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=134
2021-06-07 10:59:49 +00:00
Dominique Leuenberger
42d55dff3c Accepting request 888631 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/888631
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=81
2021-04-28 23:36:38 +00:00
Reinhard Max
755bed9cef - Update to 2.85:
* Fix problem with DNS retries in 2.83/2.84.
  * Tweak sort order of tags in get-version.
  * Avoid treating a --dhcp-host which has an IPv6 address as
    eligible for use with DHCPv4 on the grounds that it has
    no address, and vice-versa.
  * Add --dynamic-host option: A and AAAA records which take their
    network part from the network of a local interface. Useful
    for routers with dynamically prefixes.
  * Teach --bogus-nxdomain and --ignore-address to take an IPv4
    subnet.
  * CVE-2021-3448, bsc#1183709: Use random source ports where
    possible if source addresses/interfaces in use.
  * Change the method of allocation of random source ports for DNS.
  * Scale the size of the DNS random-port pool based on the
    value of the --dns-forward-max configuration.
  * Tweak TFTP code to check sender of all received packets, as
    specified in RFC 1350 para 4.

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=132
2021-04-19 21:50:31 +00:00
Reinhard Max
822e2ef139 Fix URLs.
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=131
2021-04-19 20:45:47 +00:00
Reinhard Max
6b64faead0 Accepting request 870366 from home:dirkmueller:branches:network
- update to 2.84:
  * Change HAVE_NETTLEHASH compile-time to HAVE_CRYPTOHASH
  * Tidy initialisation in hash_questions.c
  * Optimise sort_rrset for the case where the RR type
  * Move fd into frec_src

OBS-URL: https://build.opensuse.org/request/show/870366
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=130
2021-02-09 07:35:03 +00:00
Dominique Leuenberger
119b64113a Accepting request 867893 from network
OBS-URL: https://build.opensuse.org/request/show/867893
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=80
2021-02-04 19:23:46 +00:00
5761a19f0e Accepting request 867249 from home:gmbr3:Lua
- Fix building with lua54

OBS-URL: https://build.opensuse.org/request/show/867249
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=128
2021-01-30 08:06:09 +00:00
Dominique Leuenberger
e7d4817578 Accepting request 864301 from network
- Update to 2.83:
  * bsc#1177077: Fixed DNSpooq vulnerabilities
  * Use the values of --min-port and --max-port in outgoing
    TCP connections to upstream DNS servers.
  * Fix a remote buffer overflow problem in the DNSSEC code.
    Any dnsmasq with DNSSEC compiled in and enabled is vulnerable
    to this, referenced by CVE-2020-25681, CVE-2020-25682,
    CVE-2020-25683 CVE-2020-25687.
  * Be sure to only accept UDP DNS query replies at the address
    from which the query was originated. This keeps as much
    entropy in the {query-ID, random-port} tuple as possible, to
    help defeat cache poisoning attacks. Refer: CVE-2020-25684.
  * Use the SHA-256 hash function to verify that DNS answers
    received are for the questions originally asked. This replaces
    the slightly insecure SHA-1 (when compiled with DNSSEC) or
    the very insecure CRC32 (otherwise). Refer: CVE-2020-25685
  * Handle multiple identical near simultaneous DNS queries better.
    Previously, such queries would all be forwarded independently.
    This is, in theory, inefficent but in practise not a problem,
    _except_ that is means that an answer for any of the forwarded
    queries will be accepted and cached.
    An attacker can send a query multiple times, and for each
    repeat, another {port, ID} becomes capable of accepting the
    answer he is sending in the blind, to random IDs and ports.
    The chance of a succesful attack is therefore multiplied by the
    number of repeats of the query. The new behaviour detects
    repeated queries and merely stores the clients sending repeats
    so that when the first query completes, the answer can be sent
    to all the clients who asked. Refer: CVE-2020-25686.

OBS-URL: https://build.opensuse.org/request/show/864301
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=79
2021-01-20 17:23:34 +00:00
Reinhard Max
f38fa3d41b - Update to 2.83:
* bsc#1177077: Fixed DNSpooq vulnerabilities
  * Use the values of --min-port and --max-port in outgoing
    TCP connections to upstream DNS servers.
  * Fix a remote buffer overflow problem in the DNSSEC code.
    Any dnsmasq with DNSSEC compiled in and enabled is vulnerable
    to this, referenced by CVE-2020-25681, CVE-2020-25682,
    CVE-2020-25683 CVE-2020-25687.
  * Be sure to only accept UDP DNS query replies at the address
    from which the query was originated. This keeps as much
    entropy in the {query-ID, random-port} tuple as possible, to
    help defeat cache poisoning attacks. Refer: CVE-2020-25684.
  * Use the SHA-256 hash function to verify that DNS answers
    received are for the questions originally asked. This replaces
    the slightly insecure SHA-1 (when compiled with DNSSEC) or
    the very insecure CRC32 (otherwise). Refer: CVE-2020-25685
  * Handle multiple identical near simultaneous DNS queries better.
    Previously, such queries would all be forwarded independently.
    This is, in theory, inefficent but in practise not a problem,
    _except_ that is means that an answer for any of the forwarded
    queries will be accepted and cached.
    An attacker can send a query multiple times, and for each
    repeat, another {port, ID} becomes capable of accepting the
    answer he is sending in the blind, to random IDs and ports.
    The chance of a succesful attack is therefore multiplied by the
    number of repeats of the query. The new behaviour detects
    repeated queries and merely stores the clients sending repeats
    so that when the first query completes, the answer can be sent
    to all the clients who asked. Refer: CVE-2020-25686.

OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=126
2021-01-19 12:32:14 +00:00
Dominique Leuenberger
de12c31418 Accepting request 823748 from network
OBS-URL: https://build.opensuse.org/request/show/823748
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/dnsmasq?expand=0&rev=78
2020-08-03 12:13:03 +00:00
Reinhard Max
be2d2498af Accepting request 823079 from home:mrey:branches:network
- Update to 2.82:
  * Improve behaviour in the face of network interfaces which come
    and go and change index.
  * Convert hard startup failure on NETLINK_NO_ENOBUFS under
    qemu-user to a warning.
  * Allow IPv6 addresses ofthe form [::ffff:1.2.3.4] in
    --dhcp-option.
  * Fix crash under heavy TCP connection load introduced in 2.81.
  * Change default lease time for DHCPv6 to one day.
  * Alter calculation of preferred and valid times in router
    advertisements, so that these do not have a floor applied of
    the lease time in the dhcp-range if this is not explicitly
    specified and is merely the default.
- Reformat spec file with spec-cleaner

OBS-URL: https://build.opensuse.org/request/show/823079
OBS-URL: https://build.opensuse.org/package/show/network/dnsmasq?expand=0&rev=124
2020-07-31 14:11:53 +00:00