Age | Commit message (Collapse) | Author | Files | Lines |
|
Change-Id: I8c4bbd0b37b8789579fb2e3ac4cdfb7472a9a114
|
|
Change-Id: Ia335f0d8b027f8471c52e8dfdab59f3680422f10
|
|
Change-Id: Ib59076a278201769b7b309fc0aa320804c60bbbe
|
|
Change-Id: I906d516832a250a16fa9ac3e877fb10f42278c6e
|
|
Change-Id: Ia73a4e8c6a2efff2c1d07b195d17529451ca6f95
|
|
Change-Id: If6c75c812a79ed39237a4cb4af71ce73d665de75
|
|
SIGBUS crash has occured when ipv6 address is copied.
Change-Id: Ie58721f2f8aa909c61d97c7640f0897bfdb5383e
|
|
Change-Id: I36382b896dd583a66872d458f1c3b55461a9e95d
|
|
Change-Id: I9a2f4c945e0481ab803bdf0c85921433f33a9256
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Fix DoS in DNS. Invalid boundary checks in the
add_pseudoheader function allows a memcpy call with negative
size An attacker which can send malicious DNS queries
to dnsmasq can trigger a DoS remotely.
dnsmasq is vulnerable only if one of the following option is
specified: --add-mac, --add-cpe-id or --add-subnet.
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=897c113fda0886a28a986cc6ba17bb93bd6cb1c7
Change-Id: I4171560a179639755a115abfc381f03aa54f3bab
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Fix information leak in DHCPv6. A crafted DHCPv6 packet can
cause dnsmasq to forward memory from outside the packet
buffer to a DHCPv6 server when acting as a relay.
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=33e3f1029c9ec6c63e430ff51063a6301d4b2262
Change-Id: Ia97bfc821fdb07ed599e4b4fa177280e0e52c8fa
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
A DNS query recieved by UDP which exceeds 512 bytes (or the EDNS0 packet size,
if different.) is enough to cause SIGSEGV.
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=63437ffbb58837b214b4b92cb1c54bc5f3279928
Change-Id: I93a69c8e308479c0abcd64eea071473419d80946
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Fix stack overflow in DHCPv6 code. An attacker who can send
a DHCPv6 request to dnsmasq can overflow the stack frame and
crash or control dnsmasq.
Change-Id: I4474cd7d752e62c1251fedbc4f0f7c324bcca033
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Fix heap overflow in IPv6 router advertisement code.
This is a potentially serious security hole, as a
crafted RA request can overflow a buffer and crash or
control dnsmasq. Attacker must be on the local network.
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=24036ea507862c7b7898b68289c8130f85599c10
Change-Id: I3218bd52bda0c540a1c52d378b8d1b6e9ed50455
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Further fix to 0549c73b7ea6b22a3c49beb4d432f185a81efcbc
Handles case when RR name is not a pointer to the question,
only occurs for some auth-mode replies, therefore not
detected by fuzzing (?)
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=62cb936cb7ad5f219715515ae7d32dd281a5aa1f
Change-Id: I7f7fb931776dc3a9fa50a2811758c1da6dd44f0d
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Fix heap overflow in DNS code. This is a potentially serious
security hole. It allows an attacker who can make DNS
requests to dnsmasq, and who controls the contents of
a domain, which is thereby queried, to overflow
(by 2 bytes) a heap buffer and either crash, or
even take control of, dnsmasq.
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc
Change-Id: I3cc432632f51e89b888f3a5d999ba422c134847a
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: I736599d7bd407a52c6904f121971659cc73bd94d
|
|
Change-Id: I37057ff71feaab207ef877db850402f8ecb449d2
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Upstream patch is backported to resolve CVE-2015-8899
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87
Change-Id: I1024adcb4b563130a1656edcb1e093c2e28e8cea
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: Ia6b8562f51f3402fdec2ec090a7f28a308df95bc
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: I8abf444c343f504578fe0848b019ccc5f4b61c1b
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Imported Upstream version 2.74
Change-Id: I3dfe8f255eb72689fc45450c8651a5b778177cdb
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: I1ad6da6e04372b0e2f1b625ff1662d77616e603e
|
|
This reverts commit 50d251b7504e58ac58abc184ee9fe4c5b74ec387.
Change-Id: Ib37a4bd14f141095f4c4b7432e1c923d283311bf
|
|
Change-Id: If275adb44c88ff3daee1397fb7ae8a22e0f5ddbc
|
|
hosts
Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash)
via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
- CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8899
- Patch: http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87
Change-Id: If86a54c0696fea852bb9bc2f8aeece6bd6bb1598
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: I3ccc0dcd1a96299bcdc3c26a125c7cff4ee25231
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: I5e08f91c58ec8fc72c3cb61a3581ca4eb97c3298
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: I6d0f0e43a365dc39d30d2e820a080412b396170c
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: Ib66f113c7d067c0dc38436719cf78969048560d9
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: Ic7e94612466be7786c3d2b0724d745c7720e01c9
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: I4a9164181461e1adc76a6be7946be6a9f160c761
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: I41a02810399e793c4a2fcdd0a3acd7f11c5a222e
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
For SetServers and ClearCache methods check network.set privilege,
allow for everyone GetVersion method
Change-Id: Ic586d0947f8bdc1c6c96bdd40e22738a7dc63af8
Signed-off-by: Oskar Świtalski <o.switalski@samsung.com>
|
|
Change-Id: I4cda657d18f4e8788c7d9875adc34c9d4adae422
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: If3c4f77fc9b861a2978da0eee7293197c576f6fc
Bug-Tizen: TC-1230
Signed-off-by: Nicolas Zingilé <nicolas.zingile@open.eurogiciel.org>
|
|
|
|
|
|
|
|
|