[Dnsmasq-discuss] Security warning for those at the bleeding edge.

Ron Bowes ron at skullsecurity.net
Fri May 15 21:45:54 BST 2015


I can confirm - it should be 2.73 across the board :)

On Fri, May 15, 2015 at 1:12 PM, Lonnie Abelbeck <lists at lonnie.abelbeck.com>
wrote:

>
> On May 15, 2015, at 2:37 PM, Simon Kelley <simon at thekelleys.org.uk> wrote:
>
> > Anyone running 2.67rc6 or 2.67rc7 should be aware that there's a
> > remotely exploitable buffer overflow in those trees. I just tagged
> > 2.67rc8, which includes the fix.
> >
> >
> > Cheers,
> >
> > Simon.
>
> I think you meant to type 2.73rc6 ... 2.73rc7 ... 2.73rc8
>
> Fix buffer overflow introduced in 2.73rc6.
>
> Lonnie
>
>
>
> _______________________________________________
> Dnsmasq-discuss mailing list
> Dnsmasq-discuss at lists.thekelleys.org.uk
> http://lists.thekelleys.org.uk/mailman/listinfo/dnsmasq-discuss
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/attachments/20150515/d60895fd/attachment.html>


More information about the Dnsmasq-discuss mailing list