2
0
mirror of https://gitlab.isc.org/isc-projects/dhcp synced 2025-08-31 06:15:55 +00:00
Commit Graph

3606 Commits

Author SHA1 Message Date
Tomek Mrugalski
db81cc0ca0 [25901_atf] Existing alloc tests in common converted to ATF 2012-06-29 16:59:17 +02:00
Tomek Mrugalski
c08a70750c [rt25901_atf] Test checkin. 2012-06-06 13:49:47 +02:00
Tomek Mrugalski
c79f81044e Stephen's patch for ATF path. 2012-03-15 18:04:58 +00:00
Tomek Mrugalski
06fb929cbc Regenerated makefiles and scripts (using aclocal-1.10, autoheader-2.61,
automake-1.10 and autoconf-2.61 on docs.lab)
2012-01-31 16:06:53 +00:00
Tomek Mrugalski
313d4ef0a3 Added description about ATF framework and our unittests. 2012-01-31 15:50:15 +00:00
Tomek Mrugalski
a1a1503104 Existing server unittest migrated to ATF. 2012-01-31 15:44:16 +00:00
Tomek Mrugalski
2898f89e82 Support for ATF added in configure.ac 2012-01-31 15:35:25 +00:00
cvs2git
1bfe831c7b This commit was manufactured by cvs2git to create branch 'rt25901_atf'. 2012-01-24 22:23:42 +00:00
Shawn Routhier
b08e0ff57f Update copyright 2012-01-24 22:23:39 +00:00
Shawn Routhier
c4fd2ea1d1 Update backoff-cutoff description to match the code. 2012-01-24 22:21:04 +00:00
Shawn Routhier
e072c68fa9 Add bind information for 4.2.3-P1 and 4.2.3-P2 2012-01-23 17:58:56 +00:00
Tomek Mrugalski
86e294a0d1 Reverting previous commit (changes should go to rt26273, not HEAD) 2012-01-23 15:51:55 +00:00
Tomek Mrugalski
3a57419a94 Updated to BIND 9.8.2rc1 (that contains fix for Debian/kFreeBSD compilation) 2012-01-23 15:33:26 +00:00
Shawn Routhier
de6c9af6dd Fixed the code that checks if an address the server is planning
to hand out is in a reserved range.  This would appear as
the server being out of addresses in pools with particular ranges.
[ISC-Bugs #26498]
2012-01-05 00:03:18 +00:00
Shawn Routhier
dc6908b477 Remove extra "out" from note. 2012-01-04 19:53:49 +00:00
Shawn Routhier
0ef9a46e33 Modify the DDNS handling code. In a previous patch we added logging
code to the DDNS handling.  This code included a bug that caused it
to attempt to dereference a NULL pointer and eventually segfault.
While reviewing the code as we addressed this problem, we determined
that some of the updates to the lease structures would not work as
planned since the structures being updated were in the process of
being freed: these updates were removed.  In addition we removed an
incorrect call to the DDNS removal function that could cause a failure
during the removal of DDNS information from the DNS server.
Thanks to Jasper Jongmans for reporting this issue.
[ISC-Bugs #27078]
CVE: CVE-2011-4868
2011-12-30 23:08:41 +00:00
Shawn Routhier
c535de4411 Update 26704 to include a null check on the right hand side as well. 2011-11-28 18:01:25 +00:00
Shawn Routhier
846af1cd69 Added cve number 2011-11-23 17:25:30 +00:00
Shawn Routhier
317d1182fa Add acknowledgement 2011-11-23 00:24:47 +00:00
Shawn Routhier
b95f1ee070 Add a check for a null pointer before calling the regexec function.
Without out this check we could, under some circumstances, pass
a null pointer to the regexec function causing it to segfault.
[ISC-Bugs #26704].
2011-11-22 23:56:50 +00:00
Shawn Routhier
7595a1a772 Add 4.2.3 tag to bind.sh 2011-10-14 20:34:51 +00:00
Shawn Routhier
727ac12b5b Update copyright 2011-10-14 19:48:49 +00:00
Shawn Routhier
09afca0d73 Correct typos it's => its 2011-10-14 19:43:10 +00:00
Shawn Routhier
c2337bba88 Add bind tag for 4.2.3rc1 2011-10-05 00:52:05 +00:00
Shawn Routhier
3221151b74 Enhanced patch for 23595 to handle IPv4 fixed addresses more
cleanly.
2011-10-04 19:36:15 +00:00
Shawn Routhier
d424157d63 Add support for passing DDNS information to a DNS server over
an IPv6 address.  [ISC-Bugs #22647]
2011-09-21 20:36:55 +00:00
Tomek Mrugalski
b170559d44 file Makefile.am was added on branch rt25901_atf on 2012-01-31 15:44:16 +0000 2011-09-20 20:31:40 +00:00
Shawn Routhier
394c505d23 Update description and comments for macos client script.
[ISC-Bugs #18891]
2011-09-20 16:59:54 +00:00
Shawn Routhier
cf648f4174 Add FILES section tag 2011-09-19 00:24:50 +00:00
Shawn Routhier
aa46f1780d autoconf regeneration 2011-09-13 23:45:03 +00:00
Shawn Routhier
330310fbdf autoconf regeneration 2011-09-13 23:36:01 +00:00
Shawn Routhier
1e0007d153 automake regeneration 2011-09-13 23:35:56 +00:00
Shawn Routhier
dce78ca622 autoheader regeneration 2011-09-13 23:35:46 +00:00
Shawn Routhier
6f5476dd57 aclocal regeneration 2011-09-13 23:35:41 +00:00
Shawn Routhier
9a452f1782 autoconf regeneration 2011-09-13 23:04:27 +00:00
Shawn Routhier
086bd8f502 automake regeneration 2011-09-13 23:04:20 +00:00
Shawn Routhier
4c9968d6c0 autoheader regeneration 2011-09-13 23:04:07 +00:00
Shawn Routhier
b3db8084d2 aclocal regeneration 2011-09-13 23:03:58 +00:00
Shawn Routhier
25f664a63d Add AM_MAINTAINER_MODE to configure.ac to avoid rebuilding
configuration files.  [ISC-Bugs #24107]
2011-09-13 23:01:53 +00:00
Shawn Routhier
d208bb0431 Fix the code that checks for an existing DDNS transaction to cancel
when removing DDNS information, so that we will continue with the
processing if we have a lease even if it doesn't have an outstanding
transaction.  [ISC-Bugs #24682]
2011-08-22 20:39:19 +00:00
Shawn Routhier
8bd96ccb21 Two packets were found that cause a server to halt. The code
has been updated to properly process or reject the packets as
appropriate.  Thanks to David Zych at University of Illinois
for reporting this issue.  [ISC-Bugs #24960]
One CVE number for each class of packet.
CVE-2011-2748
CVE-2011-2749
2011-07-19 22:13:26 +00:00
Shawn Routhier
beaed73f00 DNS Update fix. A misconfigured server could crash during DNS update
processing if the configuration included overlapping pools or
multiple fixed-address entries for a single address.  This issue
affected both IPv4 and IPv6. The fix allows a server to detect such
conditions, provides the user with extra information and recommended
steps to fix the problem.  If the user enables the appropriate option
in site.h then server will be terminated
2011-07-08 22:49:11 +00:00
Shawn Routhier
355fb647bc May as well update the copyright. 2011-07-07 18:26:17 +00:00
Shawn Routhier
3bfbb16d55 Release update 2011-07-07 18:25:17 +00:00
Shawn Routhier
b80dae47dd fix typos adoped => adopted, synced => synchronized 2011-07-05 16:54:53 +00:00
Shawn Routhier
c850c0eec5 Restore common/discover.c, common/options.c and server/dhcp.c
as I mistakenly committed them to head instead of the ticket
branch.
2011-07-02 00:05:35 +00:00
Shawn Routhier
4e41a8d7e0 correct spelling of options 2011-07-01 23:16:37 +00:00
Shawn Routhier
640101e3d3 Correct an unsigned math operation when calculating the options
buffer space for bootp and use a better constant - DHCP packet
size instead of DHCP packet size + udp and iP headers.
Check that we have a packet->options structure before using it.
Only process packets that are longer than a bootp fixed packet
including server and file names.  Previously we allowed for
shorter packets but that wasn't working and nobody noticed.
2011-07-01 23:11:53 +00:00
Shawn Routhier
8b21af127c synched => synced 2011-07-01 18:37:09 +00:00
Tomek Mrugalski
d15aa96419 - Strict checks for content of domain-name DHCPv4 option can now be
configured during compilation time. Even though RFC2132 does not allow
  to store more than one domain in domain-name option, such behavior is
  now enabled by default, but this may change some time in the future.
  See ACCEPT_LIST_IN_DOMAIN_NAME define in includes/site.h.
  [ISC-Bugs #24167]
2011-07-01 12:07:09 +00:00