Пакет dnsmasq: Информация
Исходный пакет: dnsmasq
Версия: 2.85-alt2.p9.1
Собран: 15 декабря 2023 г. 16:48 в задании #336361
Категория: Система/Серверы
Сообщить об ошибке в пакетеДомашняя страница: http://www.thekelleys.org.uk/dnsmasq
Лицензия: GPLv2+
О пакете: A lightweight caching nameserver
Описание:
Dnsmasq is lightweight, easy to configure DNS forwarder and DHCP server. It is designed to provide DNS and, optionally, DHCP, to a small network. It can serve the names of local machines which are not in the global DNS. The DHCP server integrates with the DNS server and allows machines with DHCP-allocated addresses to appear in the DNS with names configured either in each host or in a central configuration file. Dnsmasq supports static and dynamic DHCP leases and BOOTP for network booting of diskless machines.
Список rpm-пакетов, предоставляемых данным srpm-пакетом:
dnsmasq (x86_64, ppc64le, i586, armh, aarch64)
dnsmasq-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
dnsmasq-utils (x86_64, ppc64le, i586, armh, aarch64)
dnsmasq-utils-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
dnsmasq (x86_64, ppc64le, i586, armh, aarch64)
dnsmasq-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
dnsmasq-utils (x86_64, ppc64le, i586, armh, aarch64)
dnsmasq-utils-debuginfo (x86_64, ppc64le, i586, armh, aarch64)
Сопровождающий: Mikhail Efremov
Последнее изменение
12 декабря 2023 г. Mikhail Efremov 2.85-alt2.p9.1
- Use RPM_OPT_FLAGS when build lease-tools. - Use RPM_OPT_FLAGS. - dnsmasq-helper: Fixed deadlock during restart from openresolv subscriber. - Fixed bogus date in changelog. - Fixed changelog. - Patches upstream (backport): + Set the default maximum DNS UDP packet size to 1232 (fixes: CVE-2023-28450); + Minimum safe size is recommended to be 1232; + Fix write-after-free error in DHCPv6 code (fixes: CVE-2022-0934).
9 апреля 2021 г. Mikhail Efremov 2.85-alt1
- Dropped obsoleted patch. - Updated to 2.85 (fixes: CVE-2021-3448).
22 января 2021 г. Mikhail Efremov 2.83-alt1
- Use useradd -N instead of -n. - Updated to 2.83 (fixes: CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686, CVE-2020-25687).