- 16 May, 2015 1 commit
- 
- 
Simon Kelley authoredFix off-by-one in code which checks for over-long domain names in received DNS packets. This enables buffer overflow attacks which can certainly crash dnsmasq and may allow for arbitrary code execution. The problem was introduced in commit b8f16556, release 2.73rc6, so has not escaped into any stable release. Note that the off-by-one was in the label length determination, so the buffer can be overflowed by as many bytes as there are labels in the name - ie, many. Thanks to Ron Bowes, who used lcmatuf's afl-fuzz tool to find the problem. 
 
- 
- 15 May, 2015 2 commits
- 
- 
Simon Kelley authored
- 
Simon Kelley authored
 
- 
- 14 May, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 13 May, 2015 2 commits
- 
- 
Simon Kelley authored
- 
Simon Kelley authored
 
- 
- 10 May, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 09 May, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 08 May, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 29 Apr, 2015 3 commits
- 
- 
Nicolas Cavallari authored
- 
Simon Kelley authored
- 
Simon Kelley authored
 
- 
- 27 Apr, 2015 1 commit
- 
- 
Johnny S. Lee authored
 
- 
- 26 Apr, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 23 Apr, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 22 Apr, 2015 1 commit
- 
- 
Simon Kelley authoredOnly in DNSSEC mode, where we might need to validate or store such names. In none-DNSSEC mode, simply don't cache these, as before. 
 
- 
- 21 Apr, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 20 Apr, 2015 1 commit
- 
- 
Moshe Levi authored
 
- 
- 18 Apr, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 16 Apr, 2015 3 commits
- 
- 
Simon Kelley authored
- 
Stefan Tomanek authored
- 
Simon Kelley authored
 
- 
- 13 Apr, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 10 Apr, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 07 Apr, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 04 Apr, 2015 2 commits
- 
- 
Simon Kelley authored
- 
Simon Kelley authoredReturn INSECURE when validating DNS replies which have RRSIGs, but when a needed DS record in the trust chain is proved not to exist. It's allowed for a zone to set up DNSKEY and RRSIG records first, then add a DS later, completing the chain of trust. Also, since we don't have the infrastructure to track that these non-validated replies have RRSIGS, don't cache them, so we don't provide answers with missing RRSIGS from the cache. 
 
- 
- 02 Apr, 2015 1 commit
- 
- 
Stefan Tomanek authored
 
- 
- 01 Apr, 2015 1 commit
- 
- 
Stefan Tomanek authored
 
- 
- 30 Mar, 2015 3 commits
- 
- 
Simon Kelley authored
- 
Simon Kelley authored
- 
Simon Kelley authored
 
- 
- 29 Mar, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
- 27 Mar, 2015 3 commits
- 
- 
Simon Kelley authored
- 
Simon Kelley authored
- 
Simon Kelley authored
 
- 
- 20 Mar, 2015 2 commits
- 
- 
Lung-Pin Chang authoredIf multiple routes to the same network exist, Linux blindly picks the first interface (route) based on destination address, which might not be the one we're actually offering leases. Rather than relying on this, always set the interface for outgoing unicast DHCP packets. 
- 
Simon Kelley authored
 
- 
- 12 Mar, 2015 1 commit
- 
- 
Simon Kelley authoredThe nasty code with static variable in retry_send() which avoids looping forever needs to be called on success of the syscall, to reset the static variable. 
 
- 
- 08 Mar, 2015 1 commit
- 
- 
Simon Kelley authored
 
- 
