exit if it attempted to hash a zero length client id, providing attackers
with a simple denial of service attack. Bug ticket 21253.
+- A memory leak in ddns processing was closed. [ISC-Bugs #21377]
+
Changes since 4.2.0a2
- Update the fsync code to work with the changes to the DDNS code. It now
forget_zone((struct dns_zone **)&ddns_cb->zone);
}
+ /* Should be freed by now, check just in case. */
+ if (ddns_cb->transaction != NULL)
+ log_error("Impossible memory leak at %s:%d (attempt to free "
+ "DDNS Control Block before transaction).", MDL);
+
dfree(ddns_cb, file, line);
}
}
#endif
/* This transaction is complete, clear the value */
- ddns_cb->transaction = NULL;
+ dns_client_destroyupdatetrans(&ddns_cb->transaction);
/* If we cancelled or tried to cancel the operation we just
* need to clean up. */