Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 18 Apr 2015 20:47:39 +0200
From: Harald Becker <>
Subject: Re: Re: Security advisory for musl libc - stack-based buffer
 overflow in ipv6 literal parsing [CVE-2015-1817]

Hi Laurent !

On 18.04.2015 20:27, Laurent Bercot wrote:
>  Indeed. The normative text is RFC 2181, section 10.3 : it explicitly
> forbids MX targets to be a CNAME. Most modern MTAs don't care, but some
> old ones *cough* sendmail *cough* do.

The problem is, even mail relays of big Internet providers fail on this. 
AFAIK, United Internet uses a qmail based system.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.