Date: Sat, 18 Apr 2015 20:25:25 +0200 From: Harald Becker <ralda@...ress4me.eu> To: musl@...ts.openwall.com Subject: Re: Re: Security advisory for musl libc - stack-based buffer overflow in ipv6 literal parsing [CVE-2015-1817] Hi Rich ! On 18.04.2015 18:37, Rich Felker wrote: > Odd. I just verified that Google's 126.96.36.199 resolves it right, MX and NS records must never point to a CNAME alias (RFC 2181 <https://tools.ietf.org/html/rfc2181> section 10.3) From: https://en.wikipedia.org/wiki/CNAME_record I think this is the failure! Harald
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.