dnsmasq has severe vulnerabilities until 2.78.

https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html

These include remote code execution.

1) Do these vulns affect CC installations (of which there are many)?

2) Could a revised dnsmasq be built, or is the upgrade path LEDE?

--
Jay Carlson
[email protected]

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
openwrt-users mailing list
[email protected]
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-users

Reply via email to