12.05.2026 14:36, Stuart Henderson пишет: > https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html > > Fix buffer overflow in struct bigname. CVE-2026-2291 > Fix NSEC bitmap parsing infinite loop. CVE-2026-4890 > Verify rdlen field in RRSIG packets. CVE-2026-4891 > Fix buffer overflow in helper.c with large CLIDs. CVE-2026-4892 > Fix broken client subnet validation. CVE-2026-4893 > Fix buffer overflow vulnerability in extract_addresses() CVE-2026-5172 > > ok? OK kn > > Index: Makefile > =================================================================== > RCS file: /cvs/ports/net/dnsmasq/Makefile,v > diff -u -p -r1.71 Makefile > --- Makefile 9 Feb 2026 18:10:36 -0000 1.71 > +++ Makefile 12 May 2026 11:34:08 -0000 > @@ -1,6 +1,7 @@ > COMMENT= lightweight caching DNS forwarder, DHCP and TFTP server > > -DISTNAME= dnsmasq-2.92 > +DISTNAME= dnsmasq-2.92rel2 > +PKGNAME= ${DISTNAME:S/rel/pl/} Looks like even "rel" would work, but I do prefer "pl" as well: $ pkg_check-version -v dnsmasq-2.92{,rel2} dnsmasq-2.92 has no issues dnsmasq-2.92rel2 has no issues dnsmasq-*- sorts as (older to newer): dnsmasq-2.92 dnsmasq-2.92rel2 > CATEGORIES= net > SITES= https://thekelleys.org.uk/dnsmasq/ > EXTRACT_SUFX= .tar.xz > Index: distinfo > =================================================================== > RCS file: /cvs/ports/net/dnsmasq/distinfo,v > diff -u -p -r1.47 distinfo > --- distinfo 9 Feb 2026 18:10:36 -0000 1.47 > +++ distinfo 12 May 2026 11:34:08 -0000 > @@ -1,2 +1,2 @@ > -SHA256 (dnsmasq-2.92.tar.xz) = S/UMLBAY+fvCYDffUbkOzqDLc9RhYoRnY7kt8NbDpFg= > -SIZE (dnsmasq-2.92.tar.xz) = 637752 > +SHA256 (dnsmasq-2.92rel2.tar.xz) = Q9crjBKb3zPRe6/tyYgj9j5GtQBRKAZr8NKkcqMs4Go= > +SIZE (dnsmasq-2.92rel2.tar.xz) = 638020 >
No comments:
Post a Comment