Package dnsmasq: Information

    Source package: dnsmasq
    Version: 2.85-alt2.p9.1
    Build time:  Dec 15, 2023, 04:48 PM in the task #336361
    Category: System/Servers
    Report package bug
    License: GPLv2+
    Summary: A lightweight caching nameserver
    Description: 
    Dnsmasq is lightweight, easy to configure DNS forwarder and DHCP server. It
    is designed to provide DNS and, optionally, DHCP, to a small network. It can
    serve the names of local machines which are not in the global DNS. The DHCP
    server integrates with the DNS server and allows machines with DHCP-allocated
    addresses to appear in the DNS with names configured either in each host or
    in a central configuration file. Dnsmasq supports static and dynamic DHCP
    leases and BOOTP for network booting of diskless machines.

    List of rpms provided by this srpm:
    dnsmasq (x86_64, ppc64le, i586, armh, aarch64)
    dnsmasq-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
    dnsmasq-utils (x86_64, ppc64le, i586, armh, aarch64)
    dnsmasq-utils-debuginfo (x86_64, ppc64le, i586, armh, aarch64)

    Maintainer: Mikhail Efremov


      1. libnettle-devel
      2. glibc-kernheaders
      3. libgmp-devel
      4. libidn2-devel

    Last changed


    Dec. 12, 2023 Mikhail Efremov 2.85-alt2.p9.1
    - Use RPM_OPT_FLAGS when build lease-tools.
    - Use RPM_OPT_FLAGS.
    - dnsmasq-helper: Fixed deadlock during restart from openresolv
      subscriber.
    - Fixed bogus date in changelog.
    - Fixed changelog.
    - Patches upstream (backport):
      + Set the default maximum DNS UDP packet size to 1232 (fixes: CVE-2023-28450);
      + Minimum safe size is recommended to be 1232;
      + Fix write-after-free error in DHCPv6 code (fixes: CVE-2022-0934).
    April 9, 2021 Mikhail Efremov 2.85-alt1
    - Dropped obsoleted patch.
    - Updated to 2.85 (fixes: CVE-2021-3448).
    Jan. 22, 2021 Mikhail Efremov 2.83-alt1
    - Use useradd -N instead of -n.
    - Updated to 2.83 (fixes: CVE-2020-25681, CVE-2020-25682, CVE-2020-25683,
        CVE-2020-25684, CVE-2020-25685, CVE-2020-25686, CVE-2020-25687).