Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

dnsmasq-utils-2.92-2.1 RPM for x86_64

From OpenSuSE Tumbleweed for x86_64

Name: dnsmasq-utils Distribution: openSUSE Tumbleweed
Version: 2.92 Vendor: openSUSE
Release: 2.1 Build date: Wed Mar 25 13:09:01 2026
Group: Productivity/Networking/DNS/Servers Build host: reproducible
Size: 45471 Source RPM: dnsmasq-2.92-2.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://thekelleys.org.uk/dnsmasq/
Summary: Utilities for manipulating DHCP server leases
Utilities that use the standard DHCP protocol to query/remove a DHCP
server's leases.

Provides

Requires

License

GPL-2.0-only OR GPL-3.0-only

Changelog

* Wed Mar 25 2026 Reinhard Max <max@suse.com>
  - boo#1257934, 4070a748.patch: Fix build with nettle 4.0.
* Sat Jan 24 2026 Frank Schreiner <FSchreiner@suse.com>
  - update to 2.92
    * Redesign the interaction between DNSSEC validation and per-domain
      servers, specified as --server=/<domain>/<ip-address>. This should
      just work in all cases now. If the normal chain-of-trust exists into
      the delegated domain then whether the domain is signed or not, DNSSEC
      validation will function normally. In the case the delegated domain
      is an "overlay" on top of the global DNS and no NS and/or DS records
      exist connecting it to the global dns, then if the domain is
      unsigned the situation will be handled by synthesising a
      proof-of-non-existence-of-DS for the domain and queries will be
      answered unvalidated; this action will be logged. A signed domain
      without chain-of-trust can be validated if a suitable trust-anchor
      is provided using --trust-anchor. This change should be backwards
      compatible for all existing working configurations; it extends the
      space of possible configurations which are functional.
    * Fix a couple of problems with DNSSEC validation and DNAME. One
      could cause validation failure on correct domains, and the other
      would fail to spot an invalid domain. Thanks to Graham Clinch
      for spotting the problem.
    * Add --log-queries=auth option to only log replies from the auth DNS
      facility.
    * Fix some edge-cases with domains and --address and --server. There
      has been some regressions with this in previous releases. This change
      fixes the priority order from lower to highest as:
    - -address with a IPv4 or IPv6 address (as long as the query matches the type)
    - -address with # for all-zeros, as long as the query is A or AAAA)
    - -address with no address, which returns NXDOMAIN or NOERROR for all types.
    - -server with address set to # to use the unqualified servers.
    - -server with matching domain.
    - -server without domain or from /etc/resolv.conf.
    * Fix problems with ipset or nftset and TCP DNS transport. Previously
      this was racy, and insertion of addresses could fail on a busy server
      when DNS-over-TCP transport was involved.
    * DNSSEC validation change for reverse lookups in RFC-1918 ranges and friends.
      The large public DNS services seem not to return proof-of-nonexistence
      for DS records at the start of RFC-1918 in-addr.arpa domains and the their
      IPv6 equivalents. 10.in-addr.arpa, 168.192.in-addr.arpa etc.
      Since dnsmasq already has an option which instructs it not bother
      upstream servers with pointless queries about these address ranges,
      namely --bogus-priv, we extend that to enable behaviour which allows
      dnsmasq to assume that insecure NXDOMAIN replies for these domains
      are expected and to assume that the domains are legitimately unsigned.
      This behaviour only matters when some address range is directed to
      another upstream server using --rev-server. In that case it allows
      replies from that server to pass DNSSEC validation. Without such a
      server configured, queries are never sent upstream so they are never
      validated and the new behaviour is moot.
    * Add support for leasequery to the dnsmasq DHCPv4 server.
      This has to be specifically enabled with the --leasequery option.
      Many thanks to JAXPORT, Jacksonville Port Authority for sponsoring
      this enhancement to dnsmasq.
    * Fix failure to cache PTR RRs when a reply contains more than one answer.
      Thanks to Dmitry for spotting this.
    * Add TFTP options windowsize (RFC 7440) and timeout (RFC 2349).
    * Change the behaviour of the DHCPv6 server when a REBIND message
      is received but no lease exists. Under these circumstances a new
      lease is created _only_ when the --dhcp-authoritative option is
      set. This matches the behavior of the DHCPv4 server.
    * Add --dhcp-split-relay option. This makes a DHCPv4 relay which
      is functional when client and server networks aren't mutually
      route-able.
    * Fix failure to add client MAC address to queries in TCP mode.
      The options which cause	dnsmasq	to decorate a DNS query	with the MAC
      address	on the originating client can fail when the query is sent
      using TCP. Thanks to Bruno Ravara for spotting and
      characterising this bug.
* Thu Aug 21 2025 Reinhard Max <max@suse.com>
  - bsc#1247812: Fix a segfault when setting up supplementary groups,
    but no username was specified.
* Sun May 18 2025 Gerald Chen <gerald_chen@foxmail.com>
  - update to 2.91:
    * Fix spurious "resource limit exceeded messages".
    * Fix out-of-bounds heap read in order_qsort().
    * Fix buffer overflow when configured lease-change script name
      is too long.
    * Improve behaviour in the face of non-responsive upstream TCP DNS
      servers. Without shorter timeouts, clients are blocked for too long
      and fail with their own timeouts.
    * Set --fast-dns-retries by default when doing DNSSEC. A single
      downstream query can trigger many upstream queries. On an
      unreliable network, there may not be enough downstream retries
      to ensure that all these queries complete.
    * Improve behaviour in the face of truncated answers to queries
      for DNSSEC records. Getting these answers by TCP doesn't now
      involve a faked truncated answer to the downstream client to
      force it to move to TCP. This improves performance and robustness
      in the face of broken clients which can't fall back to TCP.
    * No longer remove data from truncated upstream answers. If an
      upstream replies with a truncated answer, but the answer has some
      RRs included, return those RRs, rather than returning and
      empty answer.
    * Fix handling of EDNS0 UDP packet sizes.
    * Modify the behaviour of --synth-domain for IPv6.
    * Fix broken dhcp-relay on *BSD.
    * Add --dhcp-option-pxe config. This acts almost exactly like
    - -dhcp-option except that the defined option is only sent when
      replying to PXE clients. More importantly, these options are sent
      in reply PXE clients when dnsmasq in acting in PXE proxy mode. In
      PXE proxy mode, the set of options sent is defined by the PXE standard
      and the normal set of options is not sent. This config allows arbitrary
      options in PXE-proxy replies. A typical use-case is to send option
      175 to iPXE.
    * Support PXE proxy-DHCP and DHCP-relay at the same time.
    * Fix erroneous "DNSSEC validated" state with non-DNSSEC
      upstream servers.
    * Handle queries with EDNS client subnet fields better. If dnsmasq
      is configured to add an EDNS client subnet to a query, it is careful
      to suppress use of the cache, since a cached answer may not be valid
      for a query with a different client subnet. Extend this behaviour
      to queries which arrive a dnsmasq already carrying an EDNS client
      subnet.
    * Handle DS queries to auth zones. When dnsmasq is configured to
      act as an authoritative server and has an authoritative zone
      configured, and receives a query for that zone _as_forwarder_
      it answers the query directly rather than forwarding it. This
      doesn't affect the answer, but it saves dnsmasq forwarding the
      query to the recursor upstream, which then bounces it back to dnsmasq
      in auth mode. The exception should be when the query is for the root
      of zone, for a DS RR. The answer to that has to come from the parent,
      via the recursor, and will typically be a proof-of-non-existence
      since dnsmasq doesn't support signed zones. This patch suppresses
      local answers and forces forwarding to the upstream recursor for such
      queries. It stops breakage when a DNSSEC validating client makes
      queries to dnsmasq acting as forwarder for a zone for which it is
      authoritative.
    * Implement "DNS-0x20 encoding", for extra protection against
      reply-spoof attacks. Since DNS queries are case-insensitive,
      it's possible to randomly flip the case of letters in a query
      and still get the correct answer back.
    * Fix a long-standing problem when two queries which are identical
      in every repect _except_ case, get combined by dnsmasq. If
      dnsmasq gets eg, two queries for example.com and Example.com
      in quick succession it will get the answer for example.com from
      upstream and send that answer to both requestors. This means that
      the query for Example.com will get an answer for example.com, and
      in the modern DNS, that answer may not be accepted.
* Wed Jan 22 2025 Dominique Leuenberger <dimstar@opensuse.org>
  - Drop rcFOO symlinks for CODE16 (PED-266).
* Tue Jan 14 2025 Reinhard Max <max@suse.com>
  - bsc#1235834: Don't let compile time options change silently.
  - Use pkgconfig for libidn2.
  - Disable --nftset for SLE-15-SP3 and older.
  - bsc#1235517: Reintroduce nogroup for SLE-15-SP3 and older.
* Tue Oct 08 2024 Lukas Straub <lukasstraub2@web.de>
  - Enable --nftset support
* Wed Feb 14 2024 Reinhard Max <max@suse.com>
  - update to 2.90:
    * CVE-2023-50387, CVE-2023-50868, bsc#1219823, bsc#1219826:
      Denial Of Service while trying to validate specially crafted
      DNSSEC responses
    * CVE-2023-49441, bsc#1226091: integer overflow via forward_query
    * Fix reversion in --rev-server introduced in 2.88 which caused
      breakage if the prefix length is not exactly divisible by 8
      (IPv4) or 4 (IPv6).
    * Fix possible SEGV when there server(s) for a particular domain
      are configured, but no server which is not qualified for a
      particular domain.
    * Set the default maximum DNS UDP packet sice to 1232.
      Obsoletes: dnsmasq-CVE-2023-28450.patch
    * Add --no-dhcpv4-interface and --no-dhcpv6-interface for better
      control over which inetrfaces are providing DHCP service.
    * Fix issue with stale caching
    * Add configurable caching for arbitrary RR-types.
    * Add --filter-rr option, to filter arbitrary RR-types.
* Fri Oct 13 2023 Thorsten Kukuk <kukuk@suse.com>
  - SLP got dropped, remove config (bsc#1214884)
* Sat May 13 2023 Callum Farmer <gmbr3@opensuse.org>
  - Correct rundir from /var/run to /run for pid file
* Tue Apr 25 2023 Reinhard Max <max@suse.com>
  - bsc#1209358, CVE-2023-28450, dnsmasq-CVE-2023-28450.patch:
    default maximum EDNS.0 UDP packet size should be 1232
* Mon Feb 06 2023 Paolo Stivanin <info@paolostivanin.com>
  - update to 2.89:
    * Fix bug introduced in 2.88 (commit fe91134b) which can result
      in corruption of the DNS cache internal data structures and
      logging of "cache internal error". This has only been seen
      in one place in the wild, and it took considerable effort
      to even generate a test case to reproduce it, but there's
      no way to be sure it won't strike, and the effect is to break
      the cache badly. Installations with DNSSEC enabled are more
      likely to see the problem, but not running DNSSEC does not
      guarantee that it won't happen. Thanks to Timo van Roermund
      for reporting the bug and for his great efforts in chasing
      it down. (boo#1207174)
  - remove no longer needed rpmlintrc filters

Files

/usr/bin/dhcp_lease_time
/usr/bin/dhcp_release
/usr/bin/dhcp_release6
/usr/share/man/man1/dhcp_lease_time.1.gz
/usr/share/man/man1/dhcp_release.1.gz
/usr/share/man/man1/dhcp_release6.1.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Apr 21 22:32:08 2026