[tor-talk] The CVE-2015-7547 glibc getaddrinfo() vulnerability, and you.

nusenu nusenu at openmailbox.org
Tue Feb 16 21:10:38 UTC 2016


I'm wondering whether clients, using tor's DNSPort as upstream DNS
server, were  "accidentally protected" against exploits trying to take
advantage of this vulnerability.
(or the other way around: where exits in a "lucky" position to
compromise all their clients by providing them special DNS responses)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20160216/1ba9f016/attachment.sig>


More information about the tor-talk mailing list