[DragonFlyBSD - Bug #2969] (Resolved) CERT VU#548487 libc vulnerability in link_ntoa()

bugtracker-admin at leaf.dragonflybsd.org bugtracker-admin at leaf.dragonflybsd.org
Sat Jun 6 05:33:49 PDT 2020

Issue #2969 has been updated by deef.

Due date set to 12/06/2016
Status changed from New to Resolved

This has been already fixed by Matthew Dillon in commit 2947528a+:


Bug #2969: CERT VU#548487 libc vulnerability in link_ntoa()

* Author: benjolitz
* Status: Resolved
* Priority: Normal
* Assignee: 
* Category: 
* Target version: 
Cert has published VU#548487 that states there is a potential for a buffer overflow in link_ntoa() at https://www.kb.cert.org/vuls/id/548487.

They've a vendor page for DragonFly at https://www.kb.cert.org/vuls/id/BLUU-AF4LH7 that will allow for marking of if DF is affected/has a patch or not.

You have received this notification because you have either subscribed to it, or are involved in it.
To change your notification preferences, please click here: http://bugs.dragonflybsd.org/my/account

More information about the Bugs mailing list