Commit Graph

62 Commits

Author SHA1 Message Date
naddy
424a60c42f remove line continuation before empty lines
ok sthen@ ajacoutot@
2022-10-31 23:14:52 +00:00
sthen
7a0cb8b0bc update to isc-dhcp-4.4.3-P1
- https://kb.isc.org/docs/cve-2022-2928
Corrected a reference count leak that occurs when the server builds
responses to leasequery packets.

- https://kb.isc.org/docs/cve-2022-2929
Corrected a memory leak that occurs when unpacking a packet that has an
FQDN option (81) that contains a label with length greater than 63 bytes.
2022-10-05 17:16:17 +00:00
sthen
a8b252e239 update to isc-dhcp-4.4.3
NOTE: The client and relay components are now End-Of-Life.
This is the final release that contains those components.
2022-03-09 18:09:53 +00:00
sthen
58038baa4a update to isc-dhcp-4.4.2-P1
CVE-2021-25217: A buffer overrun in lease file parsing code can be used
to exploit a common vulnerability shared by dhcpd and dhclient
2021-05-26 21:32:04 +00:00
sthen
0390522a9e isc-dhcp: -fno-common fixes from upstream 2021-02-01 22:01:16 +00:00
cwen
99c6d0944b cmus, isc-dhcp: don't require `-latomic' anymore on powerpc, since
this arch has been switched to clang

OK danj@ jca@
2020-04-06 22:56:29 +00:00
cwen
fc0f391e08 isc-dhcp: requires atomics on macppc and hppa. gcc-libs needs to be
pulled as a LIB_DEPENDS on these archs because COMPILER_LANGS=c is set.

OK sthen@
2020-02-12 13:59:48 +00:00
sthen
03f2e0c632 new isc-dhcp doesn't build with base-gcc; use ports-gcc on !base-clang arches.
found by kmos@
2020-01-24 10:55:44 +00:00
sthen
0728e049f2 update to isc-dhcp-4.4.2 and build the new "keama" tool (Kea migration assistant) 2020-01-22 16:11:55 +00:00
sthen
b37dc1ab55 we're patching to disable backtrace in the bundled bind code; change to a
simpler patch in a file that is less likely to move between version updates
2019-12-20 21:06:17 +00:00
sthen
b4f2dcb9ef update HOMEPAGE 2019-12-17 18:03:22 +00:00
sthen
48b0b9660c replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:48:23 +00:00
sthen
6b8e265514 bump ports known/suspected to be affected by issue with libedit/libreadline
and termcap on lld arches.
2018-11-14 20:48:21 +00:00
sthen
f751bd948c update license marker, new versions of isc projects are MPL 2018-03-06 08:38:19 +00:00
sthen
cbd916a13c update to isc-dhcp 4.4.1 CVE-2018-5732 CVE-2018-5733
(4.4.0 update from Brad, 4.4.1 on top OK with him)
2018-03-06 08:37:39 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
sthen
f1483d933f update to isc-dhcp-4.3.6, from Brad 2017-09-04 17:24:44 +00:00
espie
aae85571e5 not fixed for clang, but at least avoid picking up gcc in bind,
and extract the embedded tarball so that it is patchable.
2017-07-28 21:26:04 +00:00
jca
13df2cae6d Unbreak dhcpd in v6 mode.
Upstream tries to use only IPV6_PKTINFO to specify the outgoing
interface index, but our kernel doesn't support this.  This lead
upstream to add a workaround for "bogus BSDs", namely set sin6_scope_id
in dhclient mode. But dhcpd/dhcrelay are affected by the same problem,
so always set sin6_scope_id.

Issue reported & initial diff proposed by Marc Peters, maintainer
timeout.
2017-01-30 11:34:15 +00:00
sthen
fdfa435d66 update to isc-dhcp 4.3.5, from brad 2016-10-24 12:24:13 +00:00
jca
cc99469da1 Use INSTALL_SCRIPT instead of INSTALL_PROGRAM for dhclient-script
No change in resulting package.
2016-10-03 14:34:25 +00:00
sthen
6de89043ee update to isc-dhcp-4.3.4, from brad 2016-04-09 12:59:41 +00:00
sthen
7f3f8ef36a Security update to ISC DHCP 4.3.3-P1
CVE-2015-8605: UDP payload length not properly checked

"A badly formed packet with an invalid IPv4 UDP length field can
cause a DHCP server, client, or relay program to terminate abnormally."
2016-01-13 09:33:02 +00:00
sthen
05a130fd85 Update to isc-dhcp 4.3.3, from Brad. 2015-09-12 19:00:41 +00:00
giovanni
9b284adbfd touch(1) dhcpd.leases at startup
from Patrik Lundin
2015-05-29 07:29:09 +00:00
sthen
f82a1bdf86 update to isc-dhcp 4.3.2, from brad 2015-05-12 20:07:50 +00:00
sthen
5212edf9c1 - drop jakob@ as maintainer of isc-dhcp (ok with him)
- add rc scripts
- don't use groff, there are only whitespace/header changes -
no information loss and formatting looks ok
2014-10-12 20:10:16 +00:00
brad
00bcd6cfce Update to isc-dhcp 4.3.1. 2014-09-23 10:13:40 +00:00
brad
8f29c1f1b1 Update to isc-dhcp 4.3.0.
ok sthen@
2014-03-16 11:45:15 +00:00
jca
a0871f735f Fix after arc4random_addrandom removal. Hack needed to patch a file
inside the nested bind.tar.gz archive.  Discussed with sthen@
2013-10-23 13:44:11 +00:00
brad
2f6e701f9c Update to isc-dhcp 4.2.5-P1.
ok sthen@
2013-04-03 21:06:01 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
brad
0eb57b6b43 Update to isc-dhcp 4.2.5.
ok sthen@
2013-03-07 18:59:35 +00:00
brad
9e7f2651fa Unfuck the port.
ok sthen@
2012-10-31 23:21:05 +00:00
sthen
3bbd34b389 update to ISC DHCP 4.2.4-P2; CVE-2012-3955 ok jakob@
An issue with the use of lease times was found and fixed.  Making
  certain changes to the end time of an IPv6 lease could cause the
  server to abort.  Thanks to Glen Eustace of Massey University,
  New Zealand for finding this issue.
2012-09-15 10:43:40 +00:00
sthen
7c0e03bbef update to ISC-DHCP 4.2.4-P1, from Brad
CVE-2012-3570: An Error in the Handling of an Unexpected Client
Identifiers can Cause Server Crash When Serving DHCPv6

CVE-2012-3571: An Error in the Handling of Malformed Client Identifiers
can Cause a Denial-of-Service Condition in Affected Servers

CVE-2012-3954: Memory Leaks Found in ISC DHCP
2012-08-04 21:15:35 +00:00
sthen
f83ac4e038 update to ISC dhcpd 4.2.4, from Brad. 2012-07-02 10:59:03 +00:00
jasper
7619732eb9 this needs gmake to build 2012-06-08 14:12:57 +00:00
sthen
bb1fb8e826 update to ISC-DHCPD 4.2.3-P2, from Brad. jakob@ (maintainer) ok. 2012-01-14 12:43:25 +00:00
sthen
641c85734b bumps; net/if.h 2011-11-16 00:10:31 +00:00
sthen
f2384050ef - factor ftp.isc.org MASTER_SITES into a common MASTER_SITE_ISC
- add more mirrors, prefer http
2011-04-14 13:47:59 +00:00
espie
0397d65db0 new depends 2010-11-19 22:31:32 +00:00
espie
47ff75aa46 USE_GROFF=Yes 2010-10-18 18:36:45 +00:00
jakob
35051bdde3 ISC dhcpd v3.1.3 2009-10-22 21:13:29 +00:00
jakob
e67d892dd3 upgrade to ISC DHCPD v3.1.2p1 (security release)
fixes 'DHCP Stack Overflow In 'Dhclient' Script_write_params()'; CVE-2009-0692
2009-07-15 22:21:10 +00:00
jakob
2f618aa0e4 upgrade to v3.1.1 2008-09-03 20:44:13 +00:00
jakob
7ad1cb6ec1 ISC DHCPD v3.1.0 2008-01-28 13:21:20 +00:00
jakob
acd3b70614 ISC DHCPD 3.0.6 2007-09-24 06:17:19 +00:00
merdely
241b722760 Remove surrounding quotes in COMMENT*/PERMIT_*/BROKEN/ERRORS
Add $OpenBSD$ to p5-SNMP-Info/Makefile (ok kili@, simon@)
2007-09-15 22:36:51 +00:00
espie
65ba8cf57c new MULTI_PACKAGES 2006-11-26 00:22:16 +00:00