|
Message-ID: <5532A6CB.9030704@gmx.de> Date: Sat, 18 Apr 2015 20:47:39 +0200 From: Harald Becker <ralda@....de> To: musl@...ts.openwall.com Subject: Re: Re: Security advisory for musl libc - stack-based buffer overflow in ipv6 literal parsing [CVE-2015-1817] Hi Laurent ! On 18.04.2015 20:27, Laurent Bercot wrote: > Indeed. The normative text is RFC 2181, section 10.3 : it explicitly > forbids MX targets to be a CNAME. Most modern MTAs don't care, but some > old ones *cough* sendmail *cough* do. The problem is, even mail relays of big Internet providers fail on this. AFAIK, United Internet uses a qmail based system. Harald
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.