mirror of
https://gitlab.isc.org/isc-projects/dhcp
synced 2025-08-31 14:25:41 +00:00
Previously the server code was relaxed to allow packets with zero
length client ids to be processed. Under some situations use of zero length client ids can cause the server to go into an infinite loop. As such ids are not valid according to RFC 2132 section 9.14 the server no longer accepts them. Client ids with a length of 1 are also invalid but the server still accepts them in order to minimize disruption. The restriction will likely be tightened in the future to disallow ids with a length of 1. Thanks to Markus Hietava of Codenomicon CROSS project for the finding this issue and CERT-FI for vulnerability coordination. [ISC-Bugs #29851] CVE: CVE-2012-3571
This commit is contained in:
@@ -1835,6 +1835,8 @@ void do_packet6(struct interface_info *, const char *,
|
||||
int, int, const struct iaddr *, isc_boolean_t);
|
||||
int packet6_len_okay(const char *, int);
|
||||
|
||||
int validate_packet(struct packet *);
|
||||
|
||||
int add_option(struct option_state *options,
|
||||
unsigned int option_num,
|
||||
void *data,
|
||||
|
Reference in New Issue
Block a user