Diff for /embedaddon/dhcp/RELNOTES between versions 1.1 and 1.1.1.1

version 1.1, 2012/02/21 22:30:18 version 1.1.1.1, 2012/10/09 09:06:54
Line 1 Line 1
               Internet Systems Consortium DHCP Distribution                Internet Systems Consortium DHCP Distribution
                           Version 4.1-ESV-R4                            Version 4.1-ESV-R7
                            29 November 2011                             10 September 2012
   
                               Release Notes                                Release Notes
   
                               NEW FEATURES                                NEW FEATURES
   
Version 4.1-ESV-R4 is an extended support version (ESV) release.Version 4.1-ESV-R7 is a security release of an extended support version (ESV)
ESVs are intended for users who have longer upgrade constraints.release.  ESVs are intended for users who have longer upgrade constraints.
 Please see our web page http://www.isc.org/downloads/extended-support for  Please see our web page http://www.isc.org/downloads/extended-support for
 more information on ESVs.  more information on ESVs.
   
Line 52  The system has only been tested on Linux, FreeBSD, and Line 52  The system has only been tested on Linux, FreeBSD, and
 work on other platforms. Please report any problems and suggested fixes to  work on other platforms. Please report any problems and suggested fixes to
 <dhcp-users@isc.org>.  <dhcp-users@isc.org>.
   
                           Changes since 4.1-ESV-R6
   
   - Existing legacy unit-tests have been migrated to Automated Test
     Framework (ATF). Several new tests have been developed. To enable
     unit-tests, please use --with-atf in configure script. A Developer's
     Guide has been added. To generate it, please use make devel in
     the doc directory. It is currently in early stages of development,
     but is expected to grow in the near future. [ISC-Bugs 25901]
   
   ! An issue with the use of lease times was found and fixed.  Making
     certain changes to the end time of an IPv6 lease could cause the
     server to abort.  Thanks to Glen Eustace of Massey University,
     New Zealand for finding this issue.
     [ISC-Bugs #30281]
     CVE: CVE-2012-3955
   
                           Changes since 4.1-ESV-R5
   
   - Correct code to calculate timing values in client to compare
     rebind value to infinity instead of renew value.
     Thanks to Chenda Huang from H3C Technologies Co., Limited
     for reporting this issue.
     [ISC-Bugs #29062]
   
   - Fix some issues in the code for parsing and printing options.
     [ISC-Bugs #22625] - properly print options that have several fields
     followed by an array of something for example "fIa"
     [ISC-Bugs #27289] - properly parse options in declarations that have
     several fields followed by an array of something for example "fIa"
     [ISC-Bugs #27296] - properly determine if we parsed a 16 or 32 bit
     value in evaluate_numeric_expression (extract-int).
     [ISC-Bugs #27314] - properly parse a zero length option from
     a lease file.  Thanks to Marius Tomaschewski from SUSE for the report
     and prototype patch for this ticket as well as ticket 27289.
   
   ! Previously the server code was relaxed to allow packets with zero
     length client ids to be processed.  Under some situations use of
     zero length client ids can cause the server to go into an infinite
     loop.  As such ids are not valid according to RFC 2132 section 9.14
     the server no longer accepts them.  Client ids with a length of 1
     are also invalid but the server still accepts them in order to
     minimize disruption.  The restriction will likely be tightened in
     the future to disallow ids with a length of 1.
     Thanks to Markus Hietava of Codenomicon CROSS project for the
     finding this issue and CERT-FI for vulnerability coordination.
     [ISC-Bugs #29851]
     CVE: CVE-2012-3571
   
   ! A pair of memory leaks were found and fixed.  Thanks to
     Glen Eustace of Massey University, New Zealand for finding
     this issue.
     [ISC-Bugs #30024]
     CVE: CVE-2012-3954
   
                           Changes since 4.1-ESV-R5rc2
   
   - None
   
                           Changes since 4.1-ESV-R5rc1
   
   - Rotate the lease file when running in v6 mode.
     Thanks to Christoph Moench-Tegeder at Astaro for the
     report and the first version of the patch.
     [ISC-Bugs #24887]
   
                           Changes since 4.1-ESV-R5b1
   
   - None
   
                           Changes since 4.1-ESV-R4
   
   - Fixed the code that checks if an address the server is planning
     to hand out is in a reserved range.  This would appear as
     the server being out of addresses in pools with particular ranges.
     [ISC-Bugs #26498]
   
   - Tidy up the receive calls and eliminate the need for found_pkt.
     [ISC-Bugs #25066]
   
   - Add support for Infiniband over sockets to the server and
     relay code.  We've tested this on Solaris and hope to expand
     support for Infiniband in the future.  This patch also corrects
     some issues we found in the socket code.
    [ISC-Bugs #24245]
   
   - Add a compile time check for the presence of the noreturn attribute
     and use it for log_fatal if it's available.  This will help code
     checking programs to eliminate false positives.
     [ISC-Bugs #27539]
   
   - Fixed many compilation problems ("set, but not used" warnings) for
     gcc 4.6 that may affect Ubuntu 11.10 users.
     [ISC-Bugs #27588]
   
   - Remove outdated note in the description of the bootp keyword about the
     option not satisfying the requirement of failover peers for denying
     dynamic bootp clients.
     [ISC-bugs #28574]
   
   - Multiple items to clean up IPv6 address processing.
     When processing an IA that we've seen check to see if the
     addresses are usable (not in use by somebody else) before
     handing it out.
     When reading in leases from the file discard expired addresses.
     When picking an address for a client include the IA ID in
     addition to the client ID to generally pick different addresses
     for different IAs.
     [ISC-Bugs #23138] [ISC-Bugs #27945] [ISC-Bugs #25586]
     [ISC-Bugs #27684]
   
   - Remove unnecessary checks in the lease query code and clean up
     several compiler issues (some dereferences of NULL and treating
     an int as a boolean).
     [ISC-Bugs #26203]
   
   - Fix the NA and PD allocation code to handle the case where a client
     provides a preference and the server doesn't have any addresses or
     prefixes available.  Previoulsy the server ignored the request with
     this patch it replies with a NoAddrsAvail or NoPrefixAvail response.
     By default the code performs according to the errata of August 2010
     for RFC 3315 section 17.2.2; to enable the previous style see the
     section on RFC3315_PRE_ERRATA_2010_08 in includes/site.h.  This option
     may be removed in the future.
     Thanks to Jiri Popelka at Red Hat for the patch.
     [ISC-Bugs #22676]
   
   - Fix up some issues found by static analysis.
     A potential memory leak and NULL dereference in omapi.
     The use of a boolean test instead of a bitwise test in dst.
     [ISC-Bugs #28941]
   
                         Changes since 4.1-ESV-R3                          Changes since 4.1-ESV-R3
   
 - Add AM_MAINTAINER_MODE to configure.ac to avoid rebuilding  - Add AM_MAINTAINER_MODE to configure.ac to avoid rebuilding
   configuration files.  [ISC-Bugs #24107]    configuration files.  [ISC-Bugs #24107]
     
 ! Add a check for a null pointer before calling the regexec function.  ! Add a check for a null pointer before calling the regexec function.
  Without out this check we could, under some circumstances, pass  Without this check we could, under some circumstances, pass
   a null pointer to the regexec function causing it to segfault.    a null pointer to the regexec function causing it to segfault.
   Thanks to a report from BlueCat Networks.    Thanks to a report from BlueCat Networks.
   [ISC-Bugs #26704].    [ISC-Bugs #26704].

Removed from v.1.1  
changed lines
  Added in v.1.1.1.1


FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>