[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] The CVE-2015-7547 glibc getaddrinfo() vulnerability, and you.



I'm wondering whether clients, using tor's DNSPort as upstream DNS
server, were  "accidentally protected" against exploits trying to take
advantage of this vulnerability.
(or the other way around: where exits in a "lucky" position to
compromise all their clients by providing them special DNS responses)

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk