Jan Včelák wrote:
- The 1.6 packet processing code contained the same
issue in NAPTR parsing
which was present in the 2.0. However, existing code paths to its occurrence
were different. We are not aware of any possibility to remotely crash the
server daemon at the moment.
Hi, Jan:
Do you know if this vulnerability affects versions prior to Knot DNS
1.6?
Thanks!
--
Robert Edmonds
edmonds(a)debian.org