aboutsummaryrefslogtreecommitdiffstats
path: root/main/tzdata
diff options
context:
space:
mode:
authorStuart Cardall <developer@it-offshore.co.uk>2016-02-03 22:31:49 +0000
committerNatanael Copa <ncopa@alpinelinux.org>2016-02-04 10:35:11 +0000
commit78d883ebd5cf0960c20e56a2b13133cacdb99784 (patch)
treeaf45a68e915b4d5b7271962a8934564e856b0130 /main/tzdata
parent250619cce3cb0ea6d0b95c0d9c3182f2da0df822 (diff)
downloadaports-78d883ebd5cf0960c20e56a2b13133cacdb99784.tar.bz2
aports-78d883ebd5cf0960c20e56a2b13133cacdb99784.tar.xz
testing/dnscrypt-proxy: update to 1.6.1
Malformed packets could cause the OpenDNS deviceid, OpenDNS set-client-ip, blocking and AAAA blocking plugins to use uninitialized pointers, leading to a denial of service or possibly code execution. The vulnerable code is present since dnscrypt-proxy 1.1.0. OpenDNS users and people using dnscrypt-proxy in order to block domain names and IP addresses should upgrade as soon as possible.
Diffstat (limited to 'main/tzdata')
0 files changed, 0 insertions, 0 deletions