The project isn't really maintained anymore, but it's definitely worth a
try getting a fix upstream.
The patch applies and is working, however I wonder whether it creates a
memleak, since strdup is called which allocates memory which doesn't get
free'ed again.

On 05/31/2012 11:33 AM, John Crispin wrote:
> On 31/05/12 11:23, Moritz Warning wrote:
>> Sorry, I wasn't very specific; nodogsplash exits rather than crashing.
>> It uses a safe_strdup call that exits in this case.
>>
> 
> That still makes it a remote DoS exploit :-)
> _______________________________________________
> openwrt-devel mailing list
> openwrt-devel@lists.openwrt.org
> https://lists.openwrt.org/mailman/listinfo/openwrt-devel
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to