- 20 May, 2015 1 commit
-
-
Simon Kelley authored
-
- 16 May, 2015 2 commits
-
-
Simon Kelley authored
The support was only partial, and the whole concept is now deprecated in the standards.
-
Simon Kelley authored
Fix off-by-one in code which checks for over-long domain names in received DNS packets. This enables buffer overflow attacks which can certainly crash dnsmasq and may allow for arbitrary code execution. The problem was introduced in commit b8f16556, release 2.73rc6, so has not escaped into any stable release. Note that the off-by-one was in the label length determination, so the buffer can be overflowed by as many bytes as there are labels in the name - ie, many. Thanks to Ron Bowes, who used lcmatuf's afl-fuzz tool to find the problem.
-
- 15 May, 2015 2 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
-
- 14 May, 2015 1 commit
-
-
Simon Kelley authored
-
- 13 May, 2015 2 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
-
- 10 May, 2015 1 commit
-
-
Simon Kelley authored
-
- 09 May, 2015 1 commit
-
-
Simon Kelley authored
-
- 08 May, 2015 1 commit
-
-
Simon Kelley authored
-
- 29 Apr, 2015 3 commits
-
-
Nicolas Cavallari authored
-
Simon Kelley authored
-
Simon Kelley authored
-
- 27 Apr, 2015 1 commit
-
-
Johnny S. Lee authored
-
- 26 Apr, 2015 1 commit
-
-
Simon Kelley authored
-
- 23 Apr, 2015 1 commit
-
-
Simon Kelley authored
-
- 22 Apr, 2015 1 commit
-
-
Simon Kelley authored
Only in DNSSEC mode, where we might need to validate or store such names. In none-DNSSEC mode, simply don't cache these, as before.
-
- 21 Apr, 2015 1 commit
-
-
Simon Kelley authored
-
- 20 Apr, 2015 1 commit
-
-
Moshe Levi authored
-
- 18 Apr, 2015 1 commit
-
-
Simon Kelley authored
-
- 16 Apr, 2015 3 commits
-
-
Simon Kelley authored
-
Stefan Tomanek authored
-
Simon Kelley authored
-
- 13 Apr, 2015 1 commit
-
-
Simon Kelley authored
-
- 10 Apr, 2015 1 commit
-
-
Simon Kelley authored
-
- 07 Apr, 2015 1 commit
-
-
Simon Kelley authored
-
- 04 Apr, 2015 2 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
Return INSECURE when validating DNS replies which have RRSIGs, but when a needed DS record in the trust chain is proved not to exist. It's allowed for a zone to set up DNSKEY and RRSIG records first, then add a DS later, completing the chain of trust. Also, since we don't have the infrastructure to track that these non-validated replies have RRSIGS, don't cache them, so we don't provide answers with missing RRSIGS from the cache.
-
- 02 Apr, 2015 1 commit
-
-
Stefan Tomanek authored
-
- 01 Apr, 2015 1 commit
-
-
Stefan Tomanek authored
-
- 30 Mar, 2015 3 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
-
Simon Kelley authored
-
- 29 Mar, 2015 1 commit
-
-
Simon Kelley authored
-
- 27 Mar, 2015 3 commits
-
-
Simon Kelley authored
-
Simon Kelley authored
-
Simon Kelley authored
-
- 20 Mar, 2015 2 commits
-
-
Lung-Pin Chang authored
If multiple routes to the same network exist, Linux blindly picks the first interface (route) based on destination address, which might not be the one we're actually offering leases. Rather than relying on this, always set the interface for outgoing unicast DHCP packets.
-
Simon Kelley authored
-