./net/isc-dhcp4, ISC Dynamic Host Configuration Protocol (DHCP) Base

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2022Q3, Version: 4.4.3p1, Package name: isc-dhcp-4.4.3p1, Maintainer: pkgsrc-users

ISC's Dynamic Host Configuration Protocol Distribution provides a
freely redistributable reference implementation of all aspects of
DHCP, through a suite of DHCP tools:

* A DHCP server
* A DHCP client
* A DHCP relay agent

These tools all use a modular API which is designed to be sufficiently
general that it can easily be made to work on POSIX-compliant
operating systems and also non-POSIX systems like Windows NT and
MacOS.

The DHCP server, client and relay agent are provided both as
reference implementations of the protocol and as working, fully-featured
sample implementations. Both the client and the server provide
functionality that, while not strictly required by the protocol,
is very useful in practice. The DHCP server also makes allowances
for non-compliant clients which one might still like to support.

This package contains the Base component.



Package options: inet6

Master sites:

Filesize: 9844.78 KB

Version history: (Expand)


CVS history: (Expand)


   2022-10-07 18:34:10 by Benny Siegert | Files touched by this commit (2) | Package updated
Log message:
Pullup ticket #6681 - requested by taca
net/isc-dhcp4: security fix

Revisions pulled up:
- net/isc-dhcp4/Makefile.common                                 1.45
- net/isc-dhcp4/distinfo                                        1.34

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Wed Oct  5 16:16:54 UTC 2022

   Modified Files:
   	pkgsrc/net/isc-dhcp4: Makefile.common distinfo

   Log message:
   net/isc-dhcp4: update to 4.4.3p1

   4.4.3p1 (ISC DHCP 4.4.3-P1), 2022-10-05

   		Changes since 4.4.3 (Bug Fixes)

   ! Corrected a reference count leak that occurs when the server builds
     responses to leasequery packets. Thanks to VictorV of Cyber Kunlun
     Lab for reporting the issue.
     [Gitlab #253]
     CVE: CVE-2022-2928

   ! Corrected a memory leak that occurs when unpacking a packet that has an
     FQDN option (81) that contains a label with length greater than 63 bytes.
     Thanks to VictorV of Cyber Kunlun Lab for reporting the issue.
     [Gitlab #254]
     CVE: CVE-2022-2929