[DragonFlyBSD - Bug #2969] (Resolved) CERT VU#548487 libc vulnerability in link_ntoa()

bugtracker-admin at leaf.dragonflybsd.org bugtracker-admin at leaf.dragonflybsd.org
Sat Jun 6 05:33:49 PDT 2020


Issue #2969 has been updated by deef.

Due date set to 12/06/2016
Status changed from New to Resolved

This has been already fixed by Matthew Dillon in commit 2947528a+:

https://gitweb.dragonflybsd.org/dragonfly.git/commit/2947528a83ae7a03df86a5688ef1725492b0f024

----------------------------------------
Bug #2969: CERT VU#548487 libc vulnerability in link_ntoa()
http://bugs.dragonflybsd.org/issues/2969#change-13894

* Author: benjolitz
* Status: Resolved
* Priority: Normal
* Assignee: 
* Category: 
* Target version: 
----------------------------------------
Cert has published VU#548487 that states there is a potential for a buffer overflow in link_ntoa() at https://www.kb.cert.org/vuls/id/548487.

They've a vendor page for DragonFly at https://www.kb.cert.org/vuls/id/BLUU-AF4LH7 that will allow for marking of if DF is affected/has a patch or not.





-- 
You have received this notification because you have either subscribed to it, or are involved in it.
To change your notification preferences, please click here: http://bugs.dragonflybsd.org/my/account



More information about the Bugs mailing list