Path to this page:
Next | Query returned 2 messages, browsing 1 to 10 | previous
CVS Commit History:
2012-09-13 10:01:13 by Steven Drake | Files touched by this commit (2) |
Log message:
Pullup ticket #3920 - requested by taca
net/{isc-dhcp4,isc-dhcpd4,isc-dhclient4,isc-dhcrelay} security fix
Revisions pulled up:
- net/isc-dhcp4/Makefile.common 1.17
- net/isc-dhcp4/distinfo 1.13
---
Module Name: pkgsrc
Committed By: taca
Date: Thu Sep 13 01:38:58 UTC 2012
Modified Files:
pkgsrc/net/isc-dhcp4: Makefile.common distinfo
Log message:
Update ISC DHCP package to 4.2.4p2 (ISC DHCP 4.2.4-P2).
Changes since 4.2.4-P1
! An issue with the use of lease times was found and fixed. Making
certain changes to the end time of an IPv6 lease could cause the
server to abort. Thanks to Glen Eustace of Massey University,
New Zealand for finding this issue.
[ISC-Bugs #30281]
CVE: CVE-2012-3955
|
2012-07-25 07:44:06 by S.P.Zeidler | Files touched by this commit (3) | |
Log message:
Pullup ticket #3869 - requested by taca
net/isc-dhcp4: security update
Revisions pulled up:
- net/isc-dhcp4/Makefile.common 1.16
- net/isc-dhcp4/distinfo 1.12
- net/isc-dhcp4/patches/patch-includes_Makefile.in 1.2
-------------------------------------------------------------------
Module Name: pkgsrc
Committed By: taca
Date: Wed Jul 25 00:56:53 UTC 2012
Modified Files:
pkgsrc/net/isc-dhcp4: Makefile.common distinfo
pkgsrc/net/isc-dhcp4/patches: patch-includes_Makefile.in
Log message:
Update isc-dhcp4 package to 4.2.4p1 (ISC DHCP 4.2.4-P1).
Fixes security problems.
Changes since 4.2.4
! Previously the server code was relaxed to allow packets with zero
length client ids to be processed. Under some situations use of
zero length client ids can cause the server to go into an infinite
loop. As such ids are not valid according to RFC 2132 section 9.14
the server no longer accepts them. Client ids with a length of 1
are also invalid but the server still accepts them in order to
minimize disruption. The restriction will likely be tightened in
the future to disallow ids with a length of 1.
Thanks to Markus Hietava of Codenomicon CROSS project for the
finding this issue and CERT-FI for vulnerability coordination.
[ISC-Bugs #29851]
CVE: CVE-2012-3571
! When attempting to convert a DUID from a client id option
into a hardware address handle unexpected client ids properly.
Thanks to Markus Hietava of Codenomicon CROSS project for the
finding this issue and CERT-FI for vulnerability coordination.
[ISC-Bugs #29852]
CVE: CVE-2012-3570
! A pair of memory leaks were found and fixed. Thanks to
Glen Eustace of Massey University, New Zealand for finding
this issue.
[ISC-Bugs #30024]
CVE: CVE-2012-3954
To generate a diff of this commit:
cvs rdiff -u -r1.15 -r1.16 pkgsrc/net/isc-dhcp4/Makefile.common
cvs rdiff -u -r1.11 -r1.12 pkgsrc/net/isc-dhcp4/distinfo
cvs rdiff -u -r1.1 -r1.2 \
pkgsrc/net/isc-dhcp4/patches/patch-includes_Makefile.in
|
Next | Query returned 2 messages, browsing 1 to 10 | previous