2
0
mirror of https://gitlab.isc.org/isc-projects/dhcp synced 2025-08-30 22:05:23 +00:00
Commit Graph

3604 Commits

Author SHA1 Message Date
Shawn Routhier
0c6bf326c2 automake regeneration 2012-02-16 21:06:19 +00:00
Shawn Routhier
8280b27059 autoheader regeneration 2012-02-16 21:06:05 +00:00
Shawn Routhier
f0750e0e64 aclocal regeneration 2012-02-16 21:05:56 +00:00
Shawn Routhier
b047bd385b Add support for Infiniband over sockets to the server and
relay code.  We've tested this on Solaris and hope to expand
support for Infiniband in the future.  This patch also corrects
some issues we found in the socket code.  [ISC-Bugs #24245]
2012-02-16 21:05:28 +00:00
Shawn Routhier
865afd5e44 Tidy up the receive calls and eliminate the need for found_pkt
[ISC-Bugs #25066]
2012-02-10 00:07:06 +00:00
Shawn Routhier
87132514a0 In the DDNS code handle error conditions more gracefully and add more
logging code.  The major change is to handle unexpected cancel events
from the DNS client code.
[ISC-Bugs 26287].
2012-02-03 22:47:43 +00:00
Shawn Routhier
51b8a8a0ac Move a note to get it to end up in the last 4.2.x update
moving to 4.3
2012-02-01 00:11:00 +00:00
Shawn Routhier
b08e0ff57f Update copyright 2012-01-24 22:23:39 +00:00
Shawn Routhier
c4fd2ea1d1 Update backoff-cutoff description to match the code. 2012-01-24 22:21:04 +00:00
Shawn Routhier
e072c68fa9 Add bind information for 4.2.3-P1 and 4.2.3-P2 2012-01-23 17:58:56 +00:00
Tomek Mrugalski
86e294a0d1 Reverting previous commit (changes should go to rt26273, not HEAD) 2012-01-23 15:51:55 +00:00
Tomek Mrugalski
3a57419a94 Updated to BIND 9.8.2rc1 (that contains fix for Debian/kFreeBSD compilation) 2012-01-23 15:33:26 +00:00
Shawn Routhier
de6c9af6dd Fixed the code that checks if an address the server is planning
to hand out is in a reserved range.  This would appear as
the server being out of addresses in pools with particular ranges.
[ISC-Bugs #26498]
2012-01-05 00:03:18 +00:00
Shawn Routhier
dc6908b477 Remove extra "out" from note. 2012-01-04 19:53:49 +00:00
Shawn Routhier
0ef9a46e33 Modify the DDNS handling code. In a previous patch we added logging
code to the DDNS handling.  This code included a bug that caused it
to attempt to dereference a NULL pointer and eventually segfault.
While reviewing the code as we addressed this problem, we determined
that some of the updates to the lease structures would not work as
planned since the structures being updated were in the process of
being freed: these updates were removed.  In addition we removed an
incorrect call to the DDNS removal function that could cause a failure
during the removal of DDNS information from the DNS server.
Thanks to Jasper Jongmans for reporting this issue.
[ISC-Bugs #27078]
CVE: CVE-2011-4868
2011-12-30 23:08:41 +00:00
Shawn Routhier
c535de4411 Update 26704 to include a null check on the right hand side as well. 2011-11-28 18:01:25 +00:00
Shawn Routhier
846af1cd69 Added cve number 2011-11-23 17:25:30 +00:00
Shawn Routhier
317d1182fa Add acknowledgement 2011-11-23 00:24:47 +00:00
Shawn Routhier
b95f1ee070 Add a check for a null pointer before calling the regexec function.
Without out this check we could, under some circumstances, pass
a null pointer to the regexec function causing it to segfault.
[ISC-Bugs #26704].
2011-11-22 23:56:50 +00:00
Shawn Routhier
7595a1a772 Add 4.2.3 tag to bind.sh 2011-10-14 20:34:51 +00:00
Shawn Routhier
727ac12b5b Update copyright 2011-10-14 19:48:49 +00:00
Shawn Routhier
09afca0d73 Correct typos it's => its 2011-10-14 19:43:10 +00:00
Shawn Routhier
c2337bba88 Add bind tag for 4.2.3rc1 2011-10-05 00:52:05 +00:00
Shawn Routhier
3221151b74 Enhanced patch for 23595 to handle IPv4 fixed addresses more
cleanly.
2011-10-04 19:36:15 +00:00
Shawn Routhier
d424157d63 Add support for passing DDNS information to a DNS server over
an IPv6 address.  [ISC-Bugs #22647]
2011-09-21 20:36:55 +00:00
Shawn Routhier
394c505d23 Update description and comments for macos client script.
[ISC-Bugs #18891]
2011-09-20 16:59:54 +00:00
Shawn Routhier
cf648f4174 Add FILES section tag 2011-09-19 00:24:50 +00:00
Shawn Routhier
aa46f1780d autoconf regeneration 2011-09-13 23:45:03 +00:00
Shawn Routhier
330310fbdf autoconf regeneration 2011-09-13 23:36:01 +00:00
Shawn Routhier
1e0007d153 automake regeneration 2011-09-13 23:35:56 +00:00
Shawn Routhier
dce78ca622 autoheader regeneration 2011-09-13 23:35:46 +00:00
Shawn Routhier
6f5476dd57 aclocal regeneration 2011-09-13 23:35:41 +00:00
Shawn Routhier
9a452f1782 autoconf regeneration 2011-09-13 23:04:27 +00:00
Shawn Routhier
086bd8f502 automake regeneration 2011-09-13 23:04:20 +00:00
Shawn Routhier
4c9968d6c0 autoheader regeneration 2011-09-13 23:04:07 +00:00
Shawn Routhier
b3db8084d2 aclocal regeneration 2011-09-13 23:03:58 +00:00
Shawn Routhier
25f664a63d Add AM_MAINTAINER_MODE to configure.ac to avoid rebuilding
configuration files.  [ISC-Bugs #24107]
2011-09-13 23:01:53 +00:00
Shawn Routhier
d208bb0431 Fix the code that checks for an existing DDNS transaction to cancel
when removing DDNS information, so that we will continue with the
processing if we have a lease even if it doesn't have an outstanding
transaction.  [ISC-Bugs #24682]
2011-08-22 20:39:19 +00:00
Shawn Routhier
8bd96ccb21 Two packets were found that cause a server to halt. The code
has been updated to properly process or reject the packets as
appropriate.  Thanks to David Zych at University of Illinois
for reporting this issue.  [ISC-Bugs #24960]
One CVE number for each class of packet.
CVE-2011-2748
CVE-2011-2749
2011-07-19 22:13:26 +00:00
Shawn Routhier
beaed73f00 DNS Update fix. A misconfigured server could crash during DNS update
processing if the configuration included overlapping pools or
multiple fixed-address entries for a single address.  This issue
affected both IPv4 and IPv6. The fix allows a server to detect such
conditions, provides the user with extra information and recommended
steps to fix the problem.  If the user enables the appropriate option
in site.h then server will be terminated
2011-07-08 22:49:11 +00:00
Shawn Routhier
355fb647bc May as well update the copyright. 2011-07-07 18:26:17 +00:00
Shawn Routhier
3bfbb16d55 Release update 2011-07-07 18:25:17 +00:00
Shawn Routhier
b80dae47dd fix typos adoped => adopted, synced => synchronized 2011-07-05 16:54:53 +00:00
Shawn Routhier
c850c0eec5 Restore common/discover.c, common/options.c and server/dhcp.c
as I mistakenly committed them to head instead of the ticket
branch.
2011-07-02 00:05:35 +00:00
Shawn Routhier
4e41a8d7e0 correct spelling of options 2011-07-01 23:16:37 +00:00
Shawn Routhier
640101e3d3 Correct an unsigned math operation when calculating the options
buffer space for bootp and use a better constant - DHCP packet
size instead of DHCP packet size + udp and iP headers.
Check that we have a packet->options structure before using it.
Only process packets that are longer than a bootp fixed packet
including server and file names.  Previously we allowed for
shorter packets but that wasn't working and nobody noticed.
2011-07-01 23:11:53 +00:00
Shawn Routhier
8b21af127c synched => synced 2011-07-01 18:37:09 +00:00
Tomek Mrugalski
d15aa96419 - Strict checks for content of domain-name DHCPv4 option can now be
configured during compilation time. Even though RFC2132 does not allow
  to store more than one domain in domain-name option, such behavior is
  now enabled by default, but this may change some time in the future.
  See ACCEPT_LIST_IN_DOMAIN_NAME define in includes/site.h.
  [ISC-Bugs #24167]
2011-07-01 12:07:09 +00:00
Shawn Routhier
f8cc78bad3 autoconf regeneration 2011-06-27 16:05:08 +00:00
Shawn Routhier
1b9e3275ce automake regeneration 2011-06-27 16:05:02 +00:00