Received: by mail.netbsd.org (Postfix, from userid 605) id 2744C84F22; Tue, 7 Feb 2023 08:51:47 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 57B0D84D28 for ; Tue, 7 Feb 2023 08:51:46 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([IPv6:::1]) by localhost (mail.netbsd.org [IPv6:::1]) (amavisd-new, port 10025) with ESMTP id ho9ui7K-2gYd for ; Tue, 7 Feb 2023 08:51:45 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.NetBSD.org [IPv6:2001:470:a085:999:28c:faff:fe03:5984]) by mail.netbsd.org (Postfix) with ESMTP id C0B3584CFC for ; Tue, 7 Feb 2023 08:51:45 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id B4524FA90; Tue, 7 Feb 2023 08:51:45 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1675759905199300" MIME-Version: 1.0 Date: Tue, 7 Feb 2023 08:51:45 +0000 From: "Adam Ciarcinski" Subject: CVS commit: pkgsrc/net/dnsmasq To: pkgsrc-changes@NetBSD.org Reply-To: adam@netbsd.org X-Mailer: log_accum Message-Id: <20230207085145.B4524FA90@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_1675759905199300 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: adam Date: Tue Feb 7 08:51:45 UTC 2023 Modified Files: pkgsrc/net/dnsmasq: Makefile distinfo Log Message: dnsmasq: updated to 2.89 version 2.89 Fix bug introduced in 2.88 (commit fe91134b) which can result in corruption of the DNS cache internal data structures and logging of "cache internal error". This has only been seen in one place in the wild, and it took considerable effort to even generate a test case to reproduce it, but there's no way to be sure it won't strike, and the effect is to break the cache badly. Installations with DNSSEC enabled are more likely to see the problem, but not running DNSSEC does not guarantee that it won't happen. Thanks to Timo van Roermund for reporting the bug and for his great efforts in chasing it down. To generate a diff of this commit: cvs rdiff -u -r1.48 -r1.49 pkgsrc/net/dnsmasq/Makefile cvs rdiff -u -r1.46 -r1.47 pkgsrc/net/dnsmasq/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_1675759905199300 Content-Disposition: inline Content-Length: 1620 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/net/dnsmasq/Makefile diff -u pkgsrc/net/dnsmasq/Makefile:1.48 pkgsrc/net/dnsmasq/Makefile:1.49 --- pkgsrc/net/dnsmasq/Makefile:1.48 Wed Dec 7 08:07:11 2022 +++ pkgsrc/net/dnsmasq/Makefile Tue Feb 7 08:51:45 2023 @@ -1,6 +1,6 @@ -# $NetBSD: Makefile,v 1.48 2022/12/07 08:07:11 adam Exp $ +# $NetBSD: Makefile,v 1.49 2023/02/07 08:51:45 adam Exp $ -DISTNAME= dnsmasq-2.88 +DISTNAME= dnsmasq-2.89 CATEGORIES= net MASTER_SITES= https://thekelleys.org.uk/dnsmasq/ EXTRACT_SUFX= .tar.xz Index: pkgsrc/net/dnsmasq/distinfo diff -u pkgsrc/net/dnsmasq/distinfo:1.46 pkgsrc/net/dnsmasq/distinfo:1.47 --- pkgsrc/net/dnsmasq/distinfo:1.46 Wed Dec 7 08:07:11 2022 +++ pkgsrc/net/dnsmasq/distinfo Tue Feb 7 08:51:45 2023 @@ -1,7 +1,7 @@ -$NetBSD: distinfo,v 1.46 2022/12/07 08:07:11 adam Exp $ +$NetBSD: distinfo,v 1.47 2023/02/07 08:51:45 adam Exp $ -BLAKE2s (dnsmasq-2.88.tar.xz) = aacfbf7aa74785c9bd07f25cce2f51a663effa4da6ff30c7a2b62ec8ada062f4 -SHA512 (dnsmasq-2.88.tar.xz) = 109ee4513cb25fb0c9ff6f81d696c195a24ffa013847fdc3a507757137fff098248e2b907a87695075405039c4dc0eda40803395a52306ce673ca593cc4f4e00 -Size (dnsmasq-2.88.tar.xz) = 560640 bytes +BLAKE2s (dnsmasq-2.89.tar.xz) = 1b14c7403ee3e3de7d88acf0f34ff946ca03b870e9b196745285ea53aa72f90b +SHA512 (dnsmasq-2.89.tar.xz) = 4384ed5b673e10eaf6532e6eaeb5c0a6b817581433cc28c632bdcbadbfc050a0ab73bc5b73c98d708cd39515bb3f72168714b0aa5f16436cebdd18020648d428 +Size (dnsmasq-2.89.tar.xz) = 562700 bytes SHA1 (patch-src_bpf.c) = 4115a5391f57564663bbfc448fbb865c370318a6 SHA1 (patch-src_dump.c) = e5788d9e3112b1e5b2ef7ce500b0262b95c375c6 --_----------=_1675759905199300--