The project isn't really maintained anymore, but it's definitely worth a try getting a fix upstream. The patch applies and is working, however I wonder whether it creates a memleak, since strdup is called which allocates memory which doesn't get free'ed again.
On 05/31/2012 11:33 AM, John Crispin wrote: > On 31/05/12 11:23, Moritz Warning wrote: >> Sorry, I wasn't very specific; nodogsplash exits rather than crashing. >> It uses a safe_strdup call that exits in this case. >> > > That still makes it a remote DoS exploit :-) > _______________________________________________ > openwrt-devel mailing list > openwrt-devel@lists.openwrt.org > https://lists.openwrt.org/mailman/listinfo/openwrt-devel _______________________________________________ openwrt-devel mailing list openwrt-devel@lists.openwrt.org https://lists.openwrt.org/mailman/listinfo/openwrt-devel