Path to this page:
./
net/isc-dhcp4,
ISC Dynamic Host Configuration Protocol (DHCP) Base
Branch: pkgsrc-2022Q3,
Version: 4.4.3p1,
Package name: isc-dhcp-4.4.3p1,
Maintainer: pkgsrc-usersISC's Dynamic Host Configuration Protocol Distribution provides a
freely redistributable reference implementation of all aspects of
DHCP, through a suite of DHCP tools:
* A DHCP server
* A DHCP client
* A DHCP relay agent
These tools all use a modular API which is designed to be sufficiently
general that it can easily be made to work on POSIX-compliant
operating systems and also non-POSIX systems like Windows NT and
MacOS.
The DHCP server, client and relay agent are provided both as
reference implementations of the protocol and as working, fully-featured
sample implementations. Both the client and the server provide
functionality that, while not strictly required by the protocol,
is very useful in practice. The DHCP server also makes allowances
for non-compliant clients which one might still like to support.
This package contains the Base component.
Package options: inet6
Master sites:
Filesize: 9844.78 KB
Version history: (Expand)
- (2022-10-07) Updated to version: isc-dhcp-4.4.3p1
- (2022-09-26) Package added to pkgsrc.se, version isc-dhcp-4.4.3 (created)
CVS history: (Expand)
2022-10-07 18:34:10 by Benny Siegert | Files touched by this commit (2) | |
Log message:
Pullup ticket #6681 - requested by taca
net/isc-dhcp4: security fix
Revisions pulled up:
- net/isc-dhcp4/Makefile.common 1.45
- net/isc-dhcp4/distinfo 1.34
---
Module Name: pkgsrc
Committed By: taca
Date: Wed Oct 5 16:16:54 UTC 2022
Modified Files:
pkgsrc/net/isc-dhcp4: Makefile.common distinfo
Log message:
net/isc-dhcp4: update to 4.4.3p1
4.4.3p1 (ISC DHCP 4.4.3-P1), 2022-10-05
Changes since 4.4.3 (Bug Fixes)
! Corrected a reference count leak that occurs when the server builds
responses to leasequery packets. Thanks to VictorV of Cyber Kunlun
Lab for reporting the issue.
[Gitlab #253]
CVE: CVE-2022-2928
! Corrected a memory leak that occurs when unpacking a packet that has an
FQDN option (81) that contains a label with length greater than 63 bytes.
Thanks to VictorV of Cyber Kunlun Lab for reporting the issue.
[Gitlab #254]
CVE: CVE-2022-2929
|