On Thu, May 31, 2012 at 8:09 AM, Mirko Vogt <mi...@openwrt.org> wrote:
> The project isn't really maintained anymore, but it's definitely worth a
> try getting a fix upstream.
> The patch applies and is working, however I wonder whether it creates a
> memleak, since strdup is called which allocates memory which doesn't get
> free'ed again.
>

Since Im the OpenWRT "maintainer" I can get it commit, but, honestly
it should be
really resolved upstream, so Ill contact the author, and see if 1)
hell fix it, 2) if not if
he wants to release the project to me in its entirety to continue the effort.


> On 05/31/2012 11:33 AM, John Crispin wrote:
>> On 31/05/12 11:23, Moritz Warning wrote:
>>> Sorry, I wasn't very specific; nodogsplash exits rather than crashing.
>>> It uses a safe_strdup call that exits in this case.
>>>
>>
>> That still makes it a remote DoS exploit :-)
>> _______________________________________________
>> openwrt-devel mailing list
>> openwrt-devel@lists.openwrt.org
>> https://lists.openwrt.org/mailman/listinfo/openwrt-devel
> _______________________________________________
> openwrt-devel mailing list
> openwrt-devel@lists.openwrt.org
> https://lists.openwrt.org/mailman/listinfo/openwrt-devel
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to