[DragonFlyBSD - Bug #2969] (Resolved) CERT VU#548487 libc vulnerability in link_ntoa()
bugtracker-admin at leaf.dragonflybsd.org
bugtracker-admin at leaf.dragonflybsd.org
Sat Jun 6 05:33:49 PDT 2020
Issue #2969 has been updated by deef.
Due date set to 12/06/2016
Status changed from New to Resolved
This has been already fixed by Matthew Dillon in commit 2947528a+:
https://gitweb.dragonflybsd.org/dragonfly.git/commit/2947528a83ae7a03df86a5688ef1725492b0f024
----------------------------------------
Bug #2969: CERT VU#548487 libc vulnerability in link_ntoa()
http://bugs.dragonflybsd.org/issues/2969#change-13894
* Author: benjolitz
* Status: Resolved
* Priority: Normal
* Assignee:
* Category:
* Target version:
----------------------------------------
Cert has published VU#548487 that states there is a potential for a buffer overflow in link_ntoa() at https://www.kb.cert.org/vuls/id/548487.
They've a vendor page for DragonFly at https://www.kb.cert.org/vuls/id/BLUU-AF4LH7 that will allow for marking of if DF is affected/has a patch or not.
--
You have received this notification because you have either subscribed to it, or are involved in it.
To change your notification preferences, please click here: http://bugs.dragonflybsd.org/my/account
More information about the Bugs
mailing list