./net/isc-dhcp4, ISC Dynamic Host Configuration Protocol (DHCP) Base

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2021Q1, Version: 4.4.2p1, Package name: isc-dhcp-4.4.2p1, Maintainer: pkgsrc-users

ISC's Dynamic Host Configuration Protocol Distribution provides a
freely redistributable reference implementation of all aspects of
DHCP, through a suite of DHCP tools:

* A DHCP server
* A DHCP client
* A DHCP relay agent

These tools all use a modular API which is designed to be sufficiently
general that it can easily be made to work on POSIX-compliant
operating systems and also non-POSIX systems like Windows NT and
MacOS.

The DHCP server, client and relay agent are provided both as
reference implementations of the protocol and as working, fully-featured
sample implementations. Both the client and the server provide
functionality that, while not strictly required by the protocol,
is very useful in practice. The DHCP server also makes allowances
for non-compliant clients which one might still like to support.

This package contains the Base component.



Package options: inet6

Master sites:

SHA1: 9a573dd7bb405f80c6ba41dfa88a4460755434ef
RMD160: 1e9a47e3772b6b4b94f5c252d6dba30b85d83062
Filesize: 9666.319 KB

Version history: (Expand)


CVS history: (Expand)


   2021-05-31 14:56:08 by Benny Siegert | Files touched by this commit (2) | Package updated
Log message:
Pullup ticket #6464 - requested by taca
net/isc-dhcp4: security fix

Revisions pulled up:
- net/isc-dhcp4/Makefile.common                                 1.42
- net/isc-dhcp4/distinfo                                        1.30

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu May 27 14:10:12 UTC 2021

   Modified Files:
   	pkgsrc/net/isc-dhcp4: Makefile.common distinfo

   Log message:
   net/isc-dhcp4: update to 4.4.2p1

   Update isc-dhcp4 to 4.4.2p1 (4.4.2-P1).

   		Changes since 4.4.2 (Bug Fixes)

    ! Corrected a buffer overwrite possible when parsing hexadecimal
      literals with more than 1024 octets. Reported by Jon Franklin from Dell,
      and also by Pawel Wieczorkiewicz from Amazon Web Services.
      [Gitlab #182]
      CVE: CVE-2021-25217