dnsmasq has severe vulnerabilities until 2.78. https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
These include remote code execution. 1) Do these vulns affect CC installations (of which there are many)? 2) Could a revised dnsmasq be built, or is the upgrade path LEDE? -- Jay Carlson [email protected]
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ openwrt-users mailing list [email protected] https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-users
