platform/upstream/dnsmasq.git
3 years agoHandle multiple identical near simultaneous DNS queries better. 57/252557/1 tizen_5.5
Seonah Moon [Thu, 28 Jan 2021 02:07:50 +0000 (11:07 +0900)]
Handle multiple identical near simultaneous DNS queries better.

Previously, such queries would all be forwarded
independently. This is, in theory, inefficent but in practise
not a problem, _except_ that is means that an answer for any
of the forwarded queries will be accepted and cached.
An attacker can send a query multiple times, and for each repeat,
another {port, ID} becomes capable of accepting the answer he is
sending in the blind, to random IDs and ports. The chance of a
succesful attack is therefore multiplied by the number of repeats
of the query. The new behaviour detects repeated queries and
merely stores the clients sending repeats so that when the
first query completes, the answer can be sent to all the
clients who asked. Refer: CERT VU#434904.

Backported for CVE-2020-25686

Change-Id: I2b4dfd8ff28b72ad67da4eacf2a8baa98d7eb5d9

3 years agoUse SHA-256 to provide security against DNS cache poisoning. 56/252556/1
Seonah Moon [Wed, 27 Jan 2021 11:53:38 +0000 (20:53 +0900)]
Use SHA-256 to provide security against DNS cache poisoning.

Use the SHA-256 hash function to verify that DNS answers
received are for the questions originally asked. This replaces
the slightly insecure SHA-1 (when compiled with DNSSEC) or
the very insecure CRC32 (otherwise). Refer: CERT VU#434904.

Backported for CVE-2020-25685

Change-Id: I4436a08c0ee5d63a97b4ae4f2138b73d74aac7bc

3 years agoCheck destination of DNS UDP query replies. 55/252555/1
Seonah Moon [Wed, 27 Jan 2021 11:32:53 +0000 (20:32 +0900)]
Check destination of DNS UDP query replies.

At any time, dnsmasq will have a set of sockets open, bound to
random ports, on which it sends queries to upstream nameservers.
This patch fixes the existing problem that a reply for ANY in-flight
query would be accepted via ANY open port, which increases the
chances of an attacker flooding answers "in the blind" in an
attempt to poison the DNS cache. CERT VU#434904 refers.

Backported for CVE-2020-25684

Change-Id: I11790b18ad6e179a6f3f47fee310cd00ab3c7cdd

3 years agoFix remote buffer overflow CERT VU#434904 54/252554/1
Seonah Moon [Wed, 27 Jan 2021 08:16:05 +0000 (17:16 +0900)]
Fix remote buffer overflow CERT VU#434904

The problem is in the sort_rrset() function and allows a remote
attacker to overwrite memory. Any dnsmasq instance with DNSSEC
enabled is vulnerable.

Backported for
CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687

Change-Id: If6e31a6418c113c7e390166ea32378eb1d9a5470

5 years agoFix crash issue 10/182210/1 accepted/tizen_5.0_unified accepted/tizen_5.5_unified accepted/tizen_5.5_unified_mobile_hotfix accepted/tizen_5.5_unified_wearable_hotfix accepted/tizen_6.0_unified_hotfix tizen_5.5_mobile_hotfix tizen_5.5_tv tizen_5.5_wearable_hotfix tizen_6.0_hotfix accepted/tizen/5.0/unified/20181102.024411 accepted/tizen/5.5/unified/20191031.005105 accepted/tizen/5.5/unified/mobile/hotfix/20201027.062024 accepted/tizen/5.5/unified/wearable/hotfix/20201027.102254 accepted/tizen/6.0/unified/20201030.104344 accepted/tizen/6.0/unified/hotfix/20201102.235526 accepted/tizen/unified/20180622.122621 submit/tizen/20180621.080823 submit/tizen_5.0/20181101.000006 submit/tizen_5.5/20191031.000006 submit/tizen_5.5_mobile_hotfix/20201026.185106 submit/tizen_5.5_wearable_hotfix/20201026.184306 submit/tizen_6.0/20201029.205501 submit/tizen_6.0_hotfix/20201102.192901 submit/tizen_6.0_hotfix/20201103.115101 tizen_5.5.m2_release tizen_6.0.m2_release
Seonah Moon [Fri, 15 Jun 2018 05:33:36 +0000 (14:33 +0900)]
Fix crash issue

SIGBUS crash has occured when ipv6 address is copied.

Change-Id: Ie58721f2f8aa909c61d97c7640f0897bfdb5383e

5 years agoUpdate to 2.79 05/182205/2
Seonah Moon [Thu, 21 Jun 2018 07:36:11 +0000 (16:36 +0900)]
Update to 2.79

Change-Id: I36382b896dd583a66872d458f1c3b55461a9e95d

5 years agoImported Upstream version 2.79 88/182188/1 upstream/2.79
Seonah Moon [Thu, 21 Jun 2018 06:44:41 +0000 (15:44 +0900)]
Imported Upstream version 2.79

Change-Id: I9a2f4c945e0481ab803bdf0c85921433f33a9256
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14496, Integer underflow in DNS response creation. 17/170417/1 accepted/tizen/unified/20180222.142138 submit/tizen/20180222.013450
Seonah Moon [Mon, 16 Oct 2017 07:48:06 +0000 (16:48 +0900)]
Security fix, CVE-2017-14496, Integer underflow in DNS response creation.

Fix DoS in DNS. Invalid boundary checks in the
add_pseudoheader function allows a memcpy call with negative
size An attacker which can send malicious DNS queries
to dnsmasq can trigger a DoS remotely.
dnsmasq is vulnerable only if one of the following option is
specified: --add-mac, --add-cpe-id or --add-subnet.

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=897c113fda0886a28a986cc6ba17bb93bd6cb1c7

Change-Id: I4171560a179639755a115abfc381f03aa54f3bab
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14494, Infoleak handling DHCPv6 forwarded requests. 11/170411/1
Seonah Moon [Mon, 16 Oct 2017 07:00:26 +0000 (16:00 +0900)]
Security fix, CVE-2017-14494, Infoleak handling DHCPv6 forwarded requests.

Fix information leak in DHCPv6. A crafted DHCPv6 packet can
cause dnsmasq to forward memory from outside the packet
buffer to a DHCPv6 server when acting as a relay.

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=33e3f1029c9ec6c63e430ff51063a6301d4b2262

Change-Id: Ia97bfc821fdb07ed599e4b4fa177280e0e52c8fa
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoFix CVE-2017-13704, which resulted in a crash on a large DNS query. 09/170409/1
Seonah Moon [Mon, 16 Oct 2017 06:22:30 +0000 (15:22 +0900)]
Fix CVE-2017-13704, which resulted in a crash on a large DNS query.

A DNS query recieved by UDP which exceeds 512 bytes (or the EDNS0 packet size,
if different.) is enough to cause SIGSEGV.

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=63437ffbb58837b214b4b92cb1c54bc5f3279928

Change-Id: I93a69c8e308479c0abcd64eea071473419d80946
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14493, DHCPv6 - Stack buffer overflow. 96/170296/1
Seonah Moon [Fri, 13 Oct 2017 05:54:17 +0000 (14:54 +0900)]
Security fix, CVE-2017-14493, DHCPv6 - Stack buffer overflow.

Fix stack overflow in DHCPv6 code. An attacker who can send
a DHCPv6 request to dnsmasq can overflow the stack frame and
crash or control dnsmasq.

Change-Id: I4474cd7d752e62c1251fedbc4f0f7c324bcca033
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14492, DHCPv6 RA heap overflow. 94/170294/1
Seonah Moon [Mon, 16 Oct 2017 06:41:41 +0000 (15:41 +0900)]
Security fix, CVE-2017-14492, DHCPv6 RA heap overflow.

Fix heap overflow in IPv6 router advertisement code.
This is a potentially serious security hole, as a
crafted RA request can overflow a buffer and crash or
control dnsmasq. Attacker must be on the local network.

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=24036ea507862c7b7898b68289c8130f85599c10

Change-Id: I3218bd52bda0c540a1c52d378b8d1b6e9ed50455
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14491, DNS heap buffer overflow.(2) 76/168276/1 accepted/tizen/unified/20180126.042808 submit/tizen/20180125.231631
Seonah Moon [Mon, 16 Oct 2017 09:41:09 +0000 (18:41 +0900)]
Security fix, CVE-2017-14491, DNS heap buffer overflow.(2)

Further fix to 0549c73b7ea6b22a3c49beb4d432f185a81efcbc
Handles case when RR name is not a pointer to the question,
only occurs for some auth-mode replies, therefore not
detected by fuzzing (?)

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=62cb936cb7ad5f219715515ae7d32dd281a5aa1f

Change-Id: I7f7fb931776dc3a9fa50a2811758c1da6dd44f0d
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14491, DNS heap buffer overflow.(1) 75/168275/1
Seonah Moon [Mon, 16 Oct 2017 09:27:03 +0000 (18:27 +0900)]
Security fix, CVE-2017-14491, DNS heap buffer overflow.(1)

Fix heap overflow in DNS code. This is a potentially serious
security hole. It allows an attacker who can make DNS
requests to dnsmasq, and who controls the contents of
a domain, which is thereby queried, to overflow
(by 2 bytes) a heap buffer and either crash, or
even take control of, dnsmasq.

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc

Change-Id: I3cc432632f51e89b888f3a5d999ba422c134847a
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoApply ASLR 28/143228/1 accepted/tizen/4.0/unified/20170828.222315 accepted/tizen/unified/20170814.060046 submit/tizen/20170811.040030 submit/tizen_4.0/20170828.100005 tizen_4.0.IoT.p1_release tizen_4.0.IoT.p2_release tizen_4.0.m2_release
Seonah Moon [Wed, 9 Aug 2017 06:33:29 +0000 (15:33 +0900)]
Apply ASLR

Change-Id: I736599d7bd407a52c6904f121971659cc73bd94d

6 years agoRemove unused license file (GPL-3.0+) 76/135376/1 accepted/tizen/4.0/unified/20170816.011440 accepted/tizen/unified/20170630.083334 submit/tizen/20170623.032609 submit/tizen_4.0/20170811.094300
Seonah Moon [Thu, 22 Jun 2017 06:21:39 +0000 (15:21 +0900)]
Remove unused license file (GPL-3.0+)

Change-Id: I37057ff71feaab207ef877db850402f8ecb449d2
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoFix crash when empty address from DNS overlays A record from hosts 47/131947/1 accepted/tizen/unified/20170602.154229 submit/tizen/20170601.042236
Seonah Moon [Wed, 31 May 2017 09:29:46 +0000 (18:29 +0900)]
Fix crash when empty address from DNS overlays A record from hosts

Upstream patch is backported to resolve CVE-2015-8899
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87

Change-Id: I1024adcb4b563130a1656edcb1e093c2e28e8cea
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoAdded network_fw policy for dbus 42/122742/1 accepted/tizen/unified/20170410.155810 submit/tizen/20170410.045716 tizen_4.0.m1_release
Seonah Moon [Mon, 3 Apr 2017 08:30:31 +0000 (17:30 +0900)]
Added network_fw policy for dbus

Change-Id: Ia6b8562f51f3402fdec2ec090a7f28a308df95bc
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoUsed %licesne macro for license file 70/121670/1 accepted/tizen_common accepted/tizen_ivi accepted/tizen_mobile accepted/tizen_tv accepted/tizen_wearable accepted/tizen/common/20170329.171913 accepted/tizen/ivi/20170329.034905 accepted/tizen/mobile/20170329.034824 accepted/tizen/tv/20170329.034843 accepted/tizen/unified/20170329.034931 accepted/tizen/wearable/20170329.034851 submit/tizen/20170328.111440
Seonah Moon [Tue, 28 Mar 2017 10:59:52 +0000 (19:59 +0900)]
Used %licesne macro for license file

Change-Id: I8abf444c343f504578fe0848b019ccc5f4b61c1b
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoMerge tag 'upstream/2.74' into tizen 08/120708/1 accepted/tizen/common/20170324.122455 accepted/tizen/ivi/20170324.111255 accepted/tizen/mobile/20170324.110954 accepted/tizen/tv/20170324.111134 accepted/tizen/unified/20170324.111206 accepted/tizen/wearable/20170324.111216 submit/tizen/20170324.043430
Seonah Moon [Fri, 24 Mar 2017 01:33:05 +0000 (10:33 +0900)]
Merge tag 'upstream/2.74' into tizen

Imported Upstream version 2.74

Change-Id: I3dfe8f255eb72689fc45450c8651a5b778177cdb
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoImported Upstream version 2.74 22/120322/1 upstream/2.74
taesub kim [Wed, 22 Mar 2017 09:13:18 +0000 (18:13 +0900)]
Imported Upstream version 2.74

Change-Id: I1ad6da6e04372b0e2f1b625ff1662d77616e603e

7 years agoRevert "Imported Upstream version 2.74" 14/120314/1
taesub kim [Wed, 22 Mar 2017 08:52:07 +0000 (01:52 -0700)]
Revert "Imported Upstream version 2.74"

This reverts commit 50d251b7504e58ac58abc184ee9fe4c5b74ec387.

Change-Id: Ib37a4bd14f141095f4c4b7432e1c923d283311bf

7 years agoImported Upstream version 2.74 81/120281/1
taesub kim [Wed, 22 Mar 2017 07:59:35 +0000 (16:59 +0900)]
Imported Upstream version 2.74

Change-Id: If275adb44c88ff3daee1397fb7ae8a22e0f5ddbc

7 years ago[CVE-2015-8899] Fix crash when empty address from DNS overlays A record from hosts 46/89046/1 accepted/tizen_3.0.m2_mobile accepted/tizen_3.0.m2_tv accepted/tizen_3.0.m2_wearable tizen_3.0.m2 tizen_3.0_tv accepted/tizen/3.0.m2/mobile/20170105.023648 accepted/tizen/3.0.m2/tv/20170105.024014 accepted/tizen/3.0.m2/wearable/20170105.024320 accepted/tizen/3.0/common/20161114.110523 accepted/tizen/3.0/ivi/20161011.043659 accepted/tizen/3.0/mobile/20161015.032533 accepted/tizen/3.0/tv/20161016.003723 accepted/tizen/3.0/wearable/20161015.081710 accepted/tizen/common/20160922.120630 accepted/tizen/ivi/20160922.233202 accepted/tizen/mobile/20160922.233153 accepted/tizen/tv/20160922.233159 accepted/tizen/unified/20170309.035232 accepted/tizen/wearable/20160922.233156 submit/tizen/20160922.020431 submit/tizen_3.0.m2/20170104.093752 submit/tizen_3.0_common/20161104.104000 submit/tizen_3.0_ivi/20161010.000001 submit/tizen_3.0_mobile/20161015.000001 submit/tizen_3.0_tv/20161015.000001 submit/tizen_3.0_wearable/20161015.000001 submit/tizen_unified/20170308.100412
Seonah Moon [Thu, 22 Sep 2016 01:22:33 +0000 (10:22 +0900)]
[CVE-2015-8899] Fix crash when empty address from DNS overlays A record from hosts

Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash)
via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.

- CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8899
- Patch: http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87

Change-Id: If86a54c0696fea852bb9bc2f8aeece6bd6bb1598
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoAdd dbus policy for network_fw 67/86567/1 accepted/tizen/common/20160907.154201 accepted/tizen/ivi/20160908.003634 accepted/tizen/mobile/20160908.003506 accepted/tizen/tv/20160908.003544 accepted/tizen/wearable/20160908.003608 submit/tizen/20160907.003226 submit/tizen/20160907.012754
Seonah Moon [Fri, 2 Sep 2016 02:12:15 +0000 (11:12 +0900)]
Add dbus policy for network_fw

Change-Id: I3ccc0dcd1a96299bcdc3c26a125c7cff4ee25231
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoModify the license to GPLv2 only 78/74178/1 accepted/tizen/common/20160613.144924 accepted/tizen/ivi/20160613.123654 accepted/tizen/mobile/20160613.123811 accepted/tizen/tv/20160613.123639 accepted/tizen/wearable/20160613.123748 submit/tizen/20160613.080206
Seonah Moon [Mon, 13 Jun 2016 05:45:29 +0000 (14:45 +0900)]
Modify the license to GPLv2 only

Change-Id: I5e08f91c58ec8fc72c3cb61a3581ca4eb97c3298
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years ago[TSAM-4139, TSAM-4233] Enable dbus option (HAVE_DBUS) 59/72959/2 accepted/tizen/common/20160603.151105 accepted/tizen/ivi/20160603.122713 accepted/tizen/mobile/20160603.122121 accepted/tizen/tv/20160603.122312 accepted/tizen/wearable/20160603.122556 submit/tizen/20160603.084726
Seonah Moon [Fri, 3 Jun 2016 08:34:29 +0000 (17:34 +0900)]
[TSAM-4139, TSAM-4233] Enable dbus option (HAVE_DBUS)

Change-Id: I6d0f0e43a365dc39d30d2e820a080412b396170c
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
8 years agoAdd libtzplatform-config to BuildRequires 16/66616/1 accepted/tizen/common/20160420.141622 accepted/tizen/ivi/20160421.010605 accepted/tizen/mobile/20160421.010617 accepted/tizen/tv/20160421.010548 accepted/tizen/wearable/20160421.010606 submit/tizen/20160420.044034
Seonah Moon [Wed, 20 Apr 2016 01:51:34 +0000 (10:51 +0900)]
Add libtzplatform-config to BuildRequires

Change-Id: Ib66f113c7d067c0dc38436719cf78969048560d9
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
8 years agoUpdate to 2.74 45/65045/1 accepted/tizen/common/20160407.132919 accepted/tizen/ivi/20160407.111623 accepted/tizen/mobile/20160407.111534 accepted/tizen/tv/20160407.111550 accepted/tizen/wearable/20160407.111603 submit/tizen/20160407.062043
Seonah Moon [Thu, 7 Apr 2016 05:01:07 +0000 (14:01 +0900)]
Update to 2.74

Change-Id: Ic7e94612466be7786c3d2b0724d745c7720e01c9
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
8 years agoModified hardcoded path to TZ_* 59/61859/1 accepted/tizen/common/20160311.201903 accepted/tizen/ivi/20160311.062104 accepted/tizen/mobile/20160311.062011 accepted/tizen/tv/20160311.062030 accepted/tizen/wearable/20160311.062040 submit/tizen/20160311.050645
Seonah Moon [Fri, 11 Mar 2016 04:27:56 +0000 (13:27 +0900)]
Modified hardcoded path to TZ_*

Change-Id: I4a9164181461e1adc76a6be7946be6a9f160c761
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
8 years agoBase code merged to SPIN 2.4 86/51886/1 accepted/tizen/ivi/20160218.024232 accepted/tizen/mobile/20151117.094145 accepted/tizen/tv/20151117.094204 accepted/tizen/wearable/20151117.094211 submit/tizen/20151117.062743 submit/tizen_common/20151229.142028 submit/tizen_common/20151229.144031 submit/tizen_common/20151229.154718 submit/tizen_ivi/20160217.000000 submit/tizen_ivi/20160217.000004
Seonah Moon [Tue, 17 Nov 2015 04:40:44 +0000 (13:40 +0900)]
Base code merged to SPIN 2.4

Change-Id: I41a02810399e793c4a2fcdd0a3acd7f11c5a222e
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
8 years agoApply Cynara privilege checks to dbus conf file 36/51536/1
Oskar Świtalski [Tue, 10 Nov 2015 10:14:46 +0000 (11:14 +0100)]
Apply Cynara privilege checks to dbus conf file

For SetServers and ClearCache methods check network.set privilege,
allow for everyone GetVersion method

Change-Id: Ic586d0947f8bdc1c6c96bdd40e22738a7dc63af8
Signed-off-by: Oskar Świtalski <o.switalski@samsung.com>
8 years agoInstall configure file to use d-bus on cynara policy 71/50871/2 accepted/tizen/mobile/20151103.075244 accepted/tizen/tv/20151103.075251 accepted/tizen/wearable/20151103.075254 submit/tizen/20151103.065656
Seonah Moon [Tue, 3 Nov 2015 06:00:23 +0000 (15:00 +0900)]
Install configure file to use d-bus on cynara policy

Change-Id: I4cda657d18f4e8788c7d9875adc34c9d4adae422
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
9 years agocleaned spec file: added group and license fields 36/30336/4
Nicolas Zingilé [Fri, 14 Nov 2014 15:13:35 +0000 (16:13 +0100)]
cleaned spec file: added group and license fields

Change-Id: If3c4f77fc9b861a2978da0eee7293197c576f6fc
Bug-Tizen: TC-1230
Signed-off-by: Nicolas Zingilé <nicolas.zingile@open.eurogiciel.org>
10 years agoresetting manifest requested domain to floor 57/4757/1 accepted/tizen/ivi/genivi accepted/tizen/ivi/stable accepted/tizen_3.0.2014.q3_common accepted/tizen_3.0.m14.3_ivi accepted/tizen_generic tizen_3.0.2014.q3_common tizen_3.0.2014.q4_common tizen_3.0.2015.q1_common tizen_3.0.2015.q2_common tizen_3.0.m14.2_ivi tizen_3.0.m14.3_ivi tizen_3.0.m1_mobile tizen_3.0.m1_tv tizen_3.0_ivi tizen_ivi_genivi accepted/tizen/20130710.220917 accepted/tizen/20130912.083419 accepted/tizen/20130912.085839 accepted/tizen/20130912.093301 accepted/tizen/ivi/genivi/20140131.030646 ivi_oct_m2 submit/tizen/20130710.130249 submit/tizen/20130912.075709 submit/tizen_common/20151023.083358 submit/tizen_common/20151026.085049 submit/tizen_ivi_genivi/20140131.024518 submit/tizen_mobile/20141120.000000 tizen_3.0.2014.q3_common_release tizen_3.0.m14.2_ivi_release tizen_3.0.m14.3_ivi_release tizen_3.0.m1_mobile_release tizen_3.0.m1_tv_release tizen_3.0.m2.a1_mobile_release tizen_3.0.m2.a1_tv_release tizen_3.0_ivi_release
Alexandru Cornea [Fri, 28 Jun 2013 21:28:31 +0000 (00:28 +0300)]
resetting manifest requested domain to floor

11 years agomerge with master tizen_2.1 2.1b_release accepted/tizen/20130520.101726 accepted/tizen_2.1/20130425.035315 submit/tizen/20130517.045851 submit/tizen_2.1/20130424.231154
Jinkun Jang [Fri, 15 Mar 2013 16:13:16 +0000 (01:13 +0900)]
merge with master

11 years agoTizen 2.1 base
Jinkun Jang [Tue, 12 Mar 2013 16:47:15 +0000 (01:47 +0900)]
Tizen 2.1 base

11 years agoInitial empty repository
Jung Minsun [Tue, 21 Aug 2012 02:18:06 +0000 (11:18 +0900)]
Initial empty repository