diff options
author | Stuart Cardall <developer@it-offshore.co.uk> | 2016-02-03 22:31:49 +0000 |
---|---|---|
committer | Natanael Copa <ncopa@alpinelinux.org> | 2016-02-04 10:35:11 +0000 |
commit | 78d883ebd5cf0960c20e56a2b13133cacdb99784 (patch) | |
tree | af45a68e915b4d5b7271962a8934564e856b0130 /main/tzdata | |
parent | 250619cce3cb0ea6d0b95c0d9c3182f2da0df822 (diff) | |
download | aports-78d883ebd5cf0960c20e56a2b13133cacdb99784.tar.bz2 aports-78d883ebd5cf0960c20e56a2b13133cacdb99784.tar.xz |
testing/dnscrypt-proxy: update to 1.6.1
Malformed packets could cause the OpenDNS deviceid, OpenDNS set-client-ip, blocking and
AAAA blocking plugins to use uninitialized pointers, leading to a denial of service or
possibly code execution.
The vulnerable code is present since dnscrypt-proxy 1.1.0.
OpenDNS users and people using dnscrypt-proxy in order to block domain names and
IP addresses should upgrade as soon as possible.
Diffstat (limited to 'main/tzdata')
0 files changed, 0 insertions, 0 deletions