| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
| |
Bug: 64575136
Test: builds
Change-Id: Ia33235230b73cb1a828a65dc3a8d1d396fc37d26
(cherry picked from commit 3b126928a1931ed627d736a8023aed2618b57171)
CVE-2017-14496
|
|
|
|
|
|
|
|
|
|
|
|
| |
1. Fix the length check in extract_name.
2. Add a size check to answer_request.
Bug: 64575136
Test: builds
Test: wifi tethering works
Change-Id: Ie38321ab02b7cfdc603958a884cd8f37724fedcc
(cherry picked from commit f25df861463c07908f39d9b43fe8888a4b31e848)
CVE-2017-14496
|
|\
| |
| |
| |
| |
| | |
https://android.googlesource.com/platform/external/dnsmasq into HEAD
Android 6.0.1 release 3
|
|/|
| |
| |
| |
| |
| |
| | |
struct irec pointers after malloc()
* commit '965903348a4fd412cba34b1ea4dd9bda46652fdc':
Properly initialize struct irec pointers after malloc()
|
| |\
| | |
| | |
| | |
| | |
| | |
| | | |
pointers after malloc()
* commit '0e86c5a1d5f45e700cad5d7ed47c2b298e6e170b':
Properly initialize struct irec pointers after malloc()
|
| | |\
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
malloc()
* commit '7a12cb364297118947f9ce9786f94a47eb710ce8':
Properly initialize struct irec pointers after malloc()
|
| | | |\
| | | | |
| | | | |
| | | | |
| | | | | |
* commit '4e0ada9701a819193e25f58e196fc47f9ad8c606':
Properly initialize struct irec pointers after malloc()
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Failing to properly initialize struct irec pointers to NULL after
malloc()ing structs that contain them makes subsequent comparison
of said pointers to NULL unreliable, to say the least.
Bug: 21411241
Change-Id: Id51c17a013250a5a80c867f7e074a70e0e3cc5e3
(cherry picked from commit f16178371856ff9b9d739e5b7122f1e82ee1d681)
|
|/ / / /
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Failing to properly initialize struct irec pointers to NULL after
malloc()ing structs that contain them makes subsequent comparison
of said pointers to NULL unreliable, to say the least.
Bug: 21411241
Change-Id: Id51c17a013250a5a80c867f7e074a70e0e3cc5e3
|
|\ \ \ \
| | | | |
| | | | |
| | | | | |
* commit 'f0f842adf0d07ddc6d3338b7098310756b7c6f35':
|
| |\| | |
| | | | |
| | | | |
| | | | |
| | | | | |
* commit 'e226badb960695447af4c480bb183ec35c411bbf':
Fixup existing listeners struct irec pointers.
|
|\ \ \ \ \
| |/ / / /
|/| / / /
| |/ / /
| | | | |
* commit 'e226badb960695447af4c480bb183ec35c411bbf':
Fixup existing listeners struct irec pointers.
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
This fixes a difficult to diagnose bug in which when closing old
listeners and creating new listeners, any listeners which stick
around are regrettably left with their iface pointer pointing to
a struct irec that is free()d at the end of the set_interfaces()
call.
This results in a situation where subsequent malloc()s can reuse
this memory which, when written to, corrupts the listener's concept
of its listening address (by overwriting iface.addr).
This mean that when this listener is later closed because, say,
tethering on its interface has been removed, the close logic is
comparing IPv4 socket addresses with possible garbage, resulting
in the socket not being closed because no matching listening
address is found.
Because the socket is never closed, if the interface is later
re-added the bind() to the interface address fails with
EADDRINUSE.
Also: fix a bogus memset() invocation.
Bug: 17475756
Change-Id: I369dcd50b1d03db279fdb2c1d7f0e048df21be65
|
|\| | |
| | | |
| | | |
| | | |
| | | | |
* commit '68eff53e7ed9df06f194478930f39b31c7a32458':
Allow configuring a socket mark for DNS packets.
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
This allows dnsmasq to send DNS queries on a non-default network
(e.g., the DUN APN). We add support for a mark instead of using
existing code to bind DNS servers to interfaces because:
1. Marks are more flexible, and we use them elsewhere.
2. The existing code to bind DNS servers to interfaces causes
the DNS socket to be bound to a constant port, which exposes
us to a Kaminsky attack.
Bug: 16357676
Change-Id: I8933b6de198a92c2aaf0291931ace8966ddba275
|
|\| | |
| | | |
| | | |
| | | |
| | | | |
* commit 'd1b102a58056b842bf81e0846b2d4a21e7c964eb':
Fix dnsmasq '_PATH_LOG' undeclared build error.
|
| |\| |
| | | |
| | | |
| | | |
| | | | |
* commit 'ef815e0c09f9b45868ee73a09cf7186b23b899d3':
Fix dnsmasq '_PATH_LOG' undeclared build error.
|
| | |/
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This change came from upstream, presumably so they can build against the NDK.
(cherry picked from commit 70eeec149a396b7c457d05de9e38d270a861b9fa)
Change-Id: Ic8df0bcf2c1a0619005e6a87ee467e1242da22fe
|
|\| |
| | |
| | |
| | |
| | | |
* commit '23d6d5c524cd8bb0dcba45ffa9dd546b507e7e30':
Fix dnsmasq '_PATH_LOG' undeclared build error.
|
| |/
| |
| |
| |
| |
| |
| |
| | |
This change came from upstream, presumably so they can build against the NDK.
(cherry picked from commit 70eeec149a396b7c457d05de9e38d270a861b9fa)
Change-Id: Idca02fba6fd31e60fdd5710973c98e07ac71a7bc
|
|\ \
| |/
|/| |
|
|/
|
|
|
|
| |
This change came from upstream, presumably so they can build against the NDK.
Change-Id: Iee38c615ac0bbacb3afb91e11f52281abbc1ce70
|
|
|
|
|
| |
Bug: 8580410
Change-Id: I0e478ef39bfdc83adaa8cbbd9c1b5a6b0d28bb39
|
|
|
|
|
|
|
| |
Stop being a public dns forwarder on our external interfaces.
bug:7530468
Change-Id: Ic94cd66e66371de4fcc54f53b9f267f6611804b8
|
|\
| |
| |
| |
| | |
* commit 'ad7502a6aeff431e9759e57734474576d4b085e7':
Ensure all commands read on dnsmasq's stdin are processed
|
| |\ |
|
| |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
As described in issue 30016, android dnsmasq daemon is misconfigured after initializing tethering.
The reason is that two commands are present on dnsmasq stdin when check_android_listeners is called:
update_dns:8.8.8.8:8.8.4.4\0update_dns:192.x.y.z (notice the \0 between the 2 commands).
check_android_listeners assumes there is a single NUL terminated string and skip the second one.
This patch ensure that every commands are processed by checking wether or not all the characters on stdin have been consumed and loop if needed.
Also fixes style issues.
Change-Id: I6d98233964559b8dcc1253aec105a240e1065c94
Signed-off-by: Pierre Crépieux <pierre.crepieux@orange.com>
|
|/
|
|
| |
Change-Id: I95e6f923a13322003096e67aeaaf5199624ab980
|
|
|
|
|
|
| |
Bug: 5010576
Change-Id: Ie5fcad1808bcced3198dc650816373e2f7567e54
|
|
|
|
|
|
|
| |
Copy NOTICE file from location in root into subdirectories where it will
be picked up by the build system.
Change-Id: Ie648543f307686d44b2010133c1027e8d5c7d34a
|
|
|
|
| |
Change-Id: I84244ea72c1a603cc4342da13f67831dcd8eaf34
|
|
|
|
| |
Change-Id: I9baee49df0139f5131d5a83f6d03fb2aa7a30f46
|
|
|
|
| |
Used by tethering, this would get very noisy if you had wifi active.
|
|
|
|
| |
Signed-off-by: San Mehat <san@google.com>
|
|
|
|
| |
Signed-off-by: San Mehat <san@google.com>
|
|
|
|
| |
Signed-off-by: San Mehat <san@google.com>
|
|
|
|
| |
Signed-off-by: San Mehat <san@google.com>
|
|
|
|
| |
Signed-off-by: San Mehat <san@google.com>
|
|
|