Next | Query returned 2 messages, browsing 1 to 10 | previous

History of commit frequency

CVS Commit History:


   2012-09-13 10:01:13 by Steven Drake | Files touched by this commit (2)
Log message:
Pullup ticket #3920 - requested by taca
net/{isc-dhcp4,isc-dhcpd4,isc-dhclient4,isc-dhcrelay} security fix

Revisions pulled up:
- net/isc-dhcp4/Makefile.common                                 1.17
- net/isc-dhcp4/distinfo                                        1.13

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu Sep 13 01:38:58 UTC 2012

   Modified Files:
   	pkgsrc/net/isc-dhcp4: Makefile.common distinfo

   Log message:
   Update ISC DHCP package to 4.2.4p2 (ISC DHCP 4.2.4-P2).

   			Changes since 4.2.4-P1

   ! An issue with the use of lease times was found and fixed.  Making
     certain changes to the end time of an IPv6 lease could cause the
     server to abort.  Thanks to Glen Eustace of Massey University,
     New Zealand for finding this issue.
     [ISC-Bugs #30281]
     CVE: CVE-2012-3955
   2012-07-25 07:44:06 by S.P.Zeidler | Files touched by this commit (3) | Package updated
Log message:
Pullup ticket #3869 - requested by taca
net/isc-dhcp4: security update

Revisions pulled up:
- net/isc-dhcp4/Makefile.common                                 1.16
- net/isc-dhcp4/distinfo                                        1.12
- net/isc-dhcp4/patches/patch-includes_Makefile.in              1.2

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Wed Jul 25 00:56:53 UTC 2012

   Modified Files:
   	pkgsrc/net/isc-dhcp4: Makefile.common distinfo
   	pkgsrc/net/isc-dhcp4/patches: patch-includes_Makefile.in

   Log message:
   Update isc-dhcp4 package to 4.2.4p1 (ISC DHCP 4.2.4-P1).
   Fixes security problems.

   			Changes since 4.2.4

   ! Previously the server code was relaxed to allow packets with zero
     length client ids to be processed.  Under some situations use of
     zero length client ids can cause the server to go into an infinite
     loop.  As such ids are not valid according to RFC 2132 section 9.14
     the server no longer accepts them.  Client ids with a length of 1
     are also invalid but the server still accepts them in order to
     minimize disruption.  The restriction will likely be tightened in
     the future to disallow ids with a length of 1.
     Thanks to Markus Hietava of Codenomicon CROSS project for the
     finding this issue and CERT-FI for vulnerability coordination.
     [ISC-Bugs #29851]
     CVE: CVE-2012-3571

   ! When attempting to convert a DUID from a client id option
     into a hardware address handle unexpected client ids properly.
     Thanks to Markus Hietava of Codenomicon CROSS project for the
     finding this issue and CERT-FI for vulnerability coordination.
     [ISC-Bugs #29852]
     CVE: CVE-2012-3570

   ! A pair of memory leaks were found and fixed.  Thanks to
     Glen Eustace of Massey University, New Zealand for finding
     this issue.
     [ISC-Bugs #30024]
     CVE: CVE-2012-3954

   To generate a diff of this commit:
   cvs rdiff -u -r1.15 -r1.16 pkgsrc/net/isc-dhcp4/Makefile.common
   cvs rdiff -u -r1.11 -r1.12 pkgsrc/net/isc-dhcp4/distinfo
   cvs rdiff -u -r1.1 -r1.2 \
       pkgsrc/net/isc-dhcp4/patches/patch-includes_Makefile.in

Next | Query returned 2 messages, browsing 1 to 10 | previous