Marius Tomaschewski
209e98a28b
(CVE-2011-2748,CVE-2011-2749,[ISC-Bugs #24960],bnc#712653), that allowed remote attackers to cause a denial of service (a daemon exit) via crafted BOOTP packets. Further also DNS update fix to detect overlapping pools or misconfigured fixed-address entries, that caused a server crash during DNS update and other fixes. For a complete list, please see the RELNOTES file provided in the package and also available online at http://www.isc.org/. - Merged/adopted dhclient option-checks, send-hostname-rml, ldap patch, xen-checksum, close-on-exec patches and removed obsolete in6_pktinfo-prototype and relay-no-ip-on-interface patches. - Moved server pid files into chroot directory even chroot is not used and create a link in /var/run, so it can write one when started as user without chroot and avoid stop problems when the chroot sysconfig setting changed (bnc#712438). - Disabled log-info level messages in dhclient(6) quiet mode to avoid excessive logging of non-critical messages (bnc#711420). - Fixed dhclient-script to not remove alias IP when it didn't changed to not wipe out iptables connmark when renewing the lease (bnc#700771). Thanks to James Carter for the patch. - Fixed DDNS-howto.txt reference in the config file; it has been moved to the dhcp-doc package (bnc#697279). - Removed GPL licensed files (bind-*/contrib/dbus) from bind.tgz to ensure, they're not used to build non-GPL dhcp (bnc#714004). - Changed to apply strict-aliasing/RELRO for >= 12.x only OBS-URL: https://build.opensuse.org/package/show/network:dhcp/dhcp?expand=0&rev=75
48 lines
1.3 KiB
Diff
48 lines
1.3 KiB
Diff
diff --git a/client/dhclient.c b/client/dhclient.c
|
|
index 9fd7ccc..82c26bb 100644
|
|
--- a/client/dhclient.c
|
|
+++ b/client/dhclient.c
|
|
@@ -3251,7 +3251,7 @@ void script_write_params (client, prefix, lease)
|
|
} else {
|
|
log_error("suspect value in %s "
|
|
"option - discarded",
|
|
- lease->filename);
|
|
+ "filename");
|
|
}
|
|
}
|
|
|
|
@@ -3264,7 +3264,7 @@ void script_write_params (client, prefix, lease)
|
|
} else {
|
|
log_error("suspect value in %s "
|
|
"option - discarded",
|
|
- lease->server_name);
|
|
+ "server-name");
|
|
}
|
|
}
|
|
|
|
@@ -4193,7 +4193,7 @@ static int check_domain_name(const char *ptr, size_t len, int dots)
|
|
const char *p;
|
|
|
|
/* not empty or complete length not over 255 characters */
|
|
- if ((len == 0) || (len > 256))
|
|
+ if ((len == 0) || (len >= 256))
|
|
return(-1);
|
|
|
|
/* consists of [[:alnum:]-]+ labels separated by [.] */
|
|
diff --git a/common/options.c b/common/options.c
|
|
index 80fd8db..6b95f3b 100644
|
|
--- a/common/options.c
|
|
+++ b/common/options.c
|
|
@@ -3916,7 +3916,7 @@ pretty_escape(char **dst, char *dend, const unsigned char **src,
|
|
}
|
|
} else if (**src == '"' || **src == '\'' || **src == '$' ||
|
|
**src == '`' || **src == '\\' || **src == '|' ||
|
|
- **src == '&') {
|
|
+ **src == '&' || **src == ';') {
|
|
if (*dst + 2 > dend)
|
|
return -1;
|
|
|
|
--
|
|
1.7.3.4
|
|
|