aboutsummaryrefslogtreecommitdiffstats
path: root/tools/lzma
diff options
context:
space:
mode:
authorKevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>2021-01-23 10:20:03 +0000
committerKevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>2021-01-24 15:56:39 +0000
commit297f82fc583ac277f85a8a202c3d672f93ac08f8 (patch)
treee469f8dfccc6112e96a62e43ac6990b3c4eb9be7 /tools/lzma
parent29167cbca3653de05a8b915bc21327dac7d05174 (diff)
downloadupstream-297f82fc583ac277f85a8a202c3d672f93ac08f8.tar.gz
upstream-297f82fc583ac277f85a8a202c3d672f93ac08f8.tar.bz2
upstream-297f82fc583ac277f85a8a202c3d672f93ac08f8.zip
dnsmasq: Update to 2.84test3
dnsmasq v2.83 has a bug in handling duplicate queries which means it may try to reply using the incorrect network socket. This is especially noticeable in dual stack environments where replies may be mis-directed to IPv4 addresses on an IPv6 socket or IPv6 addresses on an IPv4 socket. This results in system log spam such as: dnsmasq[16020]: failed to send packet: Network unreachable dnsmasq[16020]: failed to send packet: Address family not supported by protocol dnsmasq v2.84test3 resolves these issues. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
Diffstat (limited to 'tools/lzma')
0 files changed, 0 insertions, 0 deletions