lp:~connman-maintainers/connman/head

Created by David Barth and last modified
Get this branch:
bzr branch lp:~connman-maintainers/connman/head

Branch merges

Related bugs

Related blueprints

Branch information

Owner:
ConnMan packaging maintainers
Project:
Connection Manager
Status:
Development

Import details

Import Status: Reviewed

This branch is an import of the HEAD branch of the Git repository at git://git.kernel.org/pub/scm/network/connman/connman.git.

The next import is scheduled to run .

Last successful import was .

Import started on juju-98ee42-prod-launchpad-codeimport-2 and finished taking 10 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-3 and finished taking 20 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-4 and finished taking 20 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-4 and finished taking 10 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-2 and finished taking 10 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-3 and finished taking 20 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-5 and finished taking 20 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-3 and finished taking 10 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-2 and finished taking 20 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-2 and finished taking 15 seconds — see the log

Recent revisions

8670. By Craig Young <email address hidden>

gdhcp: Prevent a short allocation by checking upper_length

8669. By Brian Fukano <email address hidden>

dnsproxy: Do not use untrusted value in computation

static analysis tools are much happier when untrusted data sources are
not used in computations. In particular, the preferred form for
boundary checking is to compute the bounds using trusted sources and
compare to the length obtained in the untrusted source.

8668. By Brian Fukano <email address hidden>

dnsproxy: zero-terminate the buffer after recvfrom

in the case of udp_listener_event(), recvfrom reads into a buffer
which is then passed down into:
  resolv()
  ns_resolv()
  ns_try_to_resolve_from_cache()
  cache_check()

which finally invokes strlen on the buffer. It isn't clear whether the
read-in length is ever taken into account, so zero-terminate the buffer
for now.

Similarly, in tcp_client_event, the buffer filled by recvfrom is sent to
  read_tcp_data()
  cache_check()

8667. By Brian Fukano <email address hidden>

dnsproxy: Check sendto error return

Make sure to check the sendto error return value like is done elsewhere.

8666. By Brian Fukano <email address hidden>

dnsproxy: Check fcntl return value

It is astronomically unlikely that fcntl would fail, but check the error
return just in case.

8665. By Brian Fukano <email address hidden>

dnsproxy: Fix cached ttl update

This bug was exposed after fixing the signedness comparison warnings
found in dnsproxy.c update_cached_ttl() consistently comes up two
bytes short when processing the last record.

8664. By Ram Subramanian <email address hidden>

iwd: set network to connected if it is already

Without this, connman will wait for a "Connected" signal from iwd, which
is only emitted when iwd connects to a network. If it is already
connected by the time create_network() is run, that network will be
stuck in limbo.

8663. By Robert Tiemann <email address hidden>

technology: Fix memory leak.

8662. By Robert Tiemann <email address hidden>

wifi: Fix indentation.

8661. By Robert Tiemann <email address hidden>

wifi: Fix memory leak.

A GSupplicantSSID instance was leaked in ssid_ap_init() in case
connman_technology_get_wifi_tethering() didn't succeed.

Branch metadata

Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
This branch contains Public information 
Everyone can see this information.

Subscribers

No subscribers.