summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)AuthorFilesLines
2023-02-27Merge tag 'upstream/2.88' into tizenHEADtizen_9.0_m2_releasetizen_8.0_m2_releaseaccepted/tizen/unified/20230302.131053accepted/tizen/9.0/unified/20241030.232927accepted/tizen/8.0/unified/20231005.094758tizen_9.0tizen_8.0tizenaccepted/tizen_unifiedaccepted/tizen_9.0_unifiedaccepted/tizen_8.0_unifiedcheoleun moon49-1700/+3934
Change-Id: I0bd9310f2be4823799acb0901eb09625b3cdf166
2023-02-27Imported Upstream version 2.88upstream/2.88upstreamcheoleun moon49-1700/+3934
Change-Id: I71efe884b7eb0d77b9804525cf3ac4f8eee40a30
2022-01-12Merge tag 'upstream/2.86' into tizentizen_7.0_m2_releasesubmit/tizen/20220113.081517accepted/tizen/unified/20220117.134951accepted/tizen/7.0/unified/hotfix/20221116.110714accepted/tizen/7.0/unified/20221110.061034tizen_7.0_hotfixtizen_7.0accepted/tizen_7.0_unified_hotfixaccepted/tizen_7.0_unifiedSeonah Moon49-3051/+5183
Change-Id: I8c4bbd0b37b8789579fb2e3ac4cdfb7472a9a114
2022-01-12Imported Upstream version 2.86upstream/2.86Seonah Moon49-3051/+5183
Change-Id: Ia335f0d8b027f8471c52e8dfdab59f3680422f10
2021-01-27Merge tag 'upstream/2.83' into tizentizen_6.5.m2_releasesubmit/tizen_6.5/20211028.163301submit/tizen/20210205.062739accepted/tizen/unified/20210215.131008accepted/tizen/6.5/unified/20211028.223204tizen_6.5accepted/tizen_6.5_unifiedSeonah Moon11-364/+866
Change-Id: Ib59076a278201769b7b309fc0aa320804c60bbbe
2021-01-27Imported Upstream version 2.83upstream/2.83Seonah Moon11-364/+866
Change-Id: I906d516832a250a16fa9ac3e877fb10f42278c6e
2021-01-19Upgrade upstream version to 2.82submit/tizen/20210119.104018accepted/tizen/unified/20210120.120834Seonah Moon47-3200/+5309
Change-Id: Ia73a4e8c6a2efff2c1d07b195d17529451ca6f95
2021-01-18Imported Upstream version 2.82upstream/2.82Seonah Moon47-2899/+5010
Change-Id: If6c75c812a79ed39237a4cb4af71ce73d665de75
2018-06-21Fix crash issuetizen_6.0.m2_releasetizen_5.5.m2_releasesubmit/tizen_6.0_hotfix/20201103.115101submit/tizen_6.0_hotfix/20201102.192901submit/tizen_6.0/20201029.205501submit/tizen_5.5_wearable_hotfix/20201026.184306submit/tizen_5.5_mobile_hotfix/20201026.185106submit/tizen_5.5/20191031.000006submit/tizen_5.0/20181101.000006submit/tizen/20180621.080823accepted/tizen/unified/20180622.122621accepted/tizen/6.0/unified/hotfix/20201102.235526accepted/tizen/6.0/unified/20201030.104344accepted/tizen/5.5/unified/wearable/hotfix/20201027.102254accepted/tizen/5.5/unified/mobile/hotfix/20201027.062024accepted/tizen/5.5/unified/20191031.005105accepted/tizen/5.0/unified/20181102.024411tizen_6.0_hotfixtizen_5.5_wearable_hotfixtizen_5.5_tvtizen_5.5_mobile_hotfixaccepted/tizen_6.0_unified_hotfixaccepted/tizen_5.5_unified_wearable_hotfixaccepted/tizen_5.5_unified_mobile_hotfixaccepted/tizen_5.5_unifiedaccepted/tizen_5.0_unifiedSeonah Moon2-3/+18
SIGBUS crash has occured when ipv6 address is copied. Change-Id: Ie58721f2f8aa909c61d97c7640f0897bfdb5383e
2018-06-21Update to 2.79Seonah Moon43-3716/+5351
Change-Id: I36382b896dd583a66872d458f1c3b55461a9e95d
2018-06-21Imported Upstream version 2.79upstream/2.79Seonah Moon43-3694/+5389
Change-Id: I9a2f4c945e0481ab803bdf0c85921433f33a9256 Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2018-02-20Security fix, CVE-2017-14496, Integer underflow in DNS response creation.submit/tizen/20180222.013450accepted/tizen/unified/20180222.142138Seonah Moon1-0/+4
Fix DoS in DNS. Invalid boundary checks in the add_pseudoheader function allows a memcpy call with negative size An attacker which can send malicious DNS queries to dnsmasq can trigger a DoS remotely. dnsmasq is vulnerable only if one of the following option is specified: --add-mac, --add-cpe-id or --add-subnet. http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=897c113fda0886a28a986cc6ba17bb93bd6cb1c7 Change-Id: I4171560a179639755a115abfc381f03aa54f3bab Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2018-02-20Security fix, CVE-2017-14494, Infoleak handling DHCPv6 forwarded requests.Seonah Moon1-0/+3
Fix information leak in DHCPv6. A crafted DHCPv6 packet can cause dnsmasq to forward memory from outside the packet buffer to a DHCPv6 server when acting as a relay. http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=33e3f1029c9ec6c63e430ff51063a6301d4b2262 Change-Id: Ia97bfc821fdb07ed599e4b4fa177280e0e52c8fa Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2018-02-20Fix CVE-2017-13704, which resulted in a crash on a large DNS query.Seonah Moon1-0/+8
A DNS query recieved by UDP which exceeds 512 bytes (or the EDNS0 packet size, if different.) is enough to cause SIGSEGV. http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=63437ffbb58837b214b4b92cb1c54bc5f3279928 Change-Id: I93a69c8e308479c0abcd64eea071473419d80946 Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2018-02-19Security fix, CVE-2017-14493, DHCPv6 - Stack buffer overflow.Seonah Moon1-325/+328
Fix stack overflow in DHCPv6 code. An attacker who can send a DHCPv6 request to dnsmasq can overflow the stack frame and crash or control dnsmasq. Change-Id: I4474cd7d752e62c1251fedbc4f0f7c324bcca033 Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2018-02-19Security fix, CVE-2017-14492, DHCPv6 RA heap overflow.Seonah Moon1-0/+3
Fix heap overflow in IPv6 router advertisement code. This is a potentially serious security hole, as a crafted RA request can overflow a buffer and crash or control dnsmasq. Attacker must be on the local network. http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=24036ea507862c7b7898b68289c8130f85599c10 Change-Id: I3218bd52bda0c540a1c52d378b8d1b6e9ed50455 Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2018-01-25Security fix, CVE-2017-14491, DNS heap buffer overflow.(2)submit/tizen/20180125.231631accepted/tizen/unified/20180126.042808Seonah Moon1-7/+10
Further fix to 0549c73b7ea6b22a3c49beb4d432f185a81efcbc Handles case when RR name is not a pointer to the question, only occurs for some auth-mode replies, therefore not detected by fuzzing (?) http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=62cb936cb7ad5f219715515ae7d32dd281a5aa1f Change-Id: I7f7fb931776dc3a9fa50a2811758c1da6dd44f0d Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2018-01-25Security fix, CVE-2017-14491, DNS heap buffer overflow.(1)Seonah Moon7-18/+54
Fix heap overflow in DNS code. This is a potentially serious security hole. It allows an attacker who can make DNS requests to dnsmasq, and who controls the contents of a domain, which is thereby queried, to overflow (by 2 bytes) a heap buffer and either crash, or even take control of, dnsmasq. http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc Change-Id: I3cc432632f51e89b888f3a5d999ba422c134847a Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2017-05-31Fix crash when empty address from DNS overlays A record from hostssubmit/tizen/20170601.042236accepted/tizen/unified/20170602.154229Seonah Moon1-1/+1
Upstream patch is backported to resolve CVE-2015-8899 http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87 Change-Id: I1024adcb4b563130a1656edcb1e093c2e28e8cea Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2017-03-24Merge tag 'upstream/2.74' into tizensubmit/tizen/20170324.043430accepted/tizen/wearable/20170324.111216accepted/tizen/unified/20170324.111206accepted/tizen/tv/20170324.111134accepted/tizen/mobile/20170324.110954accepted/tizen/ivi/20170324.111255accepted/tizen/common/20170324.122455Seonah Moon1-1/+1
Imported Upstream version 2.74 Change-Id: I3dfe8f255eb72689fc45450c8651a5b778177cdb Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2017-03-22Imported Upstream version 2.74upstream/2.74taesub kim2-4/+2
Change-Id: I1ad6da6e04372b0e2f1b625ff1662d77616e603e
2017-03-22Revert "Imported Upstream version 2.74"taesub kim2-2/+4
This reverts commit 50d251b7504e58ac58abc184ee9fe4c5b74ec387. Change-Id: Ib37a4bd14f141095f4c4b7432e1c923d283311bf
2017-03-22Imported Upstream version 2.74taesub kim2-4/+2
Change-Id: If275adb44c88ff3daee1397fb7ae8a22e0f5ddbc
2016-09-22[CVE-2015-8899] Fix crash when empty address from DNS overlays A record from ↵submit/tizen_unified/20170308.100412submit/tizen_3.0_wearable/20161015.000001submit/tizen_3.0_tv/20161015.000001submit/tizen_3.0_mobile/20161015.000001submit/tizen_3.0_ivi/20161010.000001submit/tizen_3.0_common/20161104.104000submit/tizen_3.0.m2/20170104.093752submit/tizen/20160922.020431accepted/tizen/wearable/20160922.233156accepted/tizen/unified/20170309.035232accepted/tizen/tv/20160922.233159accepted/tizen/mobile/20160922.233153accepted/tizen/ivi/20160922.233202accepted/tizen/common/20160922.120630accepted/tizen/3.0/wearable/20161015.081710accepted/tizen/3.0/tv/20161016.003723accepted/tizen/3.0/mobile/20161015.032533accepted/tizen/3.0/ivi/20161011.043659accepted/tizen/3.0/common/20161114.110523accepted/tizen/3.0.m2/wearable/20170105.024320accepted/tizen/3.0.m2/tv/20170105.024014accepted/tizen/3.0.m2/mobile/20170105.023648tizen_3.0_tvtizen_3.0.m2accepted/tizen_3.0.m2_wearableaccepted/tizen_3.0.m2_tvaccepted/tizen_3.0.m2_mobileSeonah Moon1-1/+1
hosts Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally. - CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8899 - Patch: http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87 Change-Id: If86a54c0696fea852bb9bc2f8aeece6bd6bb1598 Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2016-06-03[TSAM-4139, TSAM-4233] Enable dbus option (HAVE_DBUS)submit/tizen/20160603.084726accepted/tizen/wearable/20160603.122556accepted/tizen/tv/20160603.122312accepted/tizen/mobile/20160603.122121accepted/tizen/ivi/20160603.122713accepted/tizen/common/20160603.151105Seonah Moon1-1/+1
Change-Id: I6d0f0e43a365dc39d30d2e820a080412b396170c Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2016-04-07Update to 2.74submit/tizen/20160407.062043accepted/tizen/wearable/20160407.111603accepted/tizen/tv/20160407.111550accepted/tizen/mobile/20160407.111534accepted/tizen/ivi/20160407.111623accepted/tizen/common/20160407.132919Seonah Moon39-4011/+21217
Change-Id: Ic7e94612466be7786c3d2b0724d745c7720e01c9 Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2015-11-17Base code merged to SPIN 2.4submit/tizen_ivi/20160217.000004submit/tizen_ivi/20160217.000000submit/tizen_common/20151229.154718submit/tizen_common/20151229.144031submit/tizen_common/20151229.142028submit/tizen/20151117.062743accepted/tizen/wearable/20151117.094211accepted/tizen/tv/20151117.094204accepted/tizen/mobile/20151117.094145accepted/tizen/ivi/20160218.024232Seonah Moon1-5/+1
Change-Id: I41a02810399e793c4a2fcdd0a3acd7f11c5a222e Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
2013-03-16merge with mastersubmit/tizen_2.1/20130424.231154submit/tizen/20130517.045851accepted/tizen_2.1/20130425.035315accepted/tizen/20130520.1017262.1b_releasetizen_2.1Jinkun Jang1-5/+5
2013-03-13Tizen 2.1 baseJinkun Jang20-0/+18771