12.05.2026 14:36, Stuart Henderson пишет:
> https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html
> 
>     Fix buffer overflow in struct bigname.  CVE-2026-2291
>     Fix NSEC bitmap parsing infinite loop. CVE-2026-4890
>     Verify rdlen field in RRSIG packets. CVE-2026-4891
>     Fix buffer overflow in helper.c with large CLIDs. CVE-2026-4892
>     Fix broken client subnet validation. CVE-2026-4893
>     Fix buffer overflow vulnerability in extract_addresses() CVE-2026-5172
> 
> ok?

OK kn

> 
> Index: Makefile
> ===================================================================
> RCS file: /cvs/ports/net/dnsmasq/Makefile,v
> diff -u -p -r1.71 Makefile
> --- Makefile  9 Feb 2026 18:10:36 -0000       1.71
> +++ Makefile  12 May 2026 11:34:08 -0000
> @@ -1,6 +1,7 @@
>  COMMENT=     lightweight caching DNS forwarder, DHCP and TFTP server
>  
> -DISTNAME=    dnsmasq-2.92
> +DISTNAME=    dnsmasq-2.92rel2
> +PKGNAME=     ${DISTNAME:S/rel/pl/}

Looks like even "rel" would work, but I do prefer "pl" as well:

        $ pkg_check-version -v dnsmasq-2.92{,rel2}
        dnsmasq-2.92 has no issues
        dnsmasq-2.92rel2 has no issues
        dnsmasq-*- sorts as (older to newer): dnsmasq-2.92 dnsmasq-2.92rel2

>  CATEGORIES=  net
>  SITES=               https://thekelleys.org.uk/dnsmasq/
>  EXTRACT_SUFX=        .tar.xz
> Index: distinfo
> ===================================================================
> RCS file: /cvs/ports/net/dnsmasq/distinfo,v
> diff -u -p -r1.47 distinfo
> --- distinfo  9 Feb 2026 18:10:36 -0000       1.47
> +++ distinfo  12 May 2026 11:34:08 -0000
> @@ -1,2 +1,2 @@
> -SHA256 (dnsmasq-2.92.tar.xz) = S/UMLBAY+fvCYDffUbkOzqDLc9RhYoRnY7kt8NbDpFg=
> -SIZE (dnsmasq-2.92.tar.xz) = 637752
> +SHA256 (dnsmasq-2.92rel2.tar.xz) = 
> Q9crjBKb3zPRe6/tyYgj9j5GtQBRKAZr8NKkcqMs4Go=
> +SIZE (dnsmasq-2.92rel2.tar.xz) = 638020
> 

Reply via email to