Actions
Bug #2969
closedCERT VU#548487 libc vulnerability in link_ntoa()
Status:
Resolved
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
Start date:
12/06/2016
Due date:
12/06/2016
% Done:
0%
Estimated time:
Description
Cert has published VU#548487 that states there is a potential for a buffer overflow in link_ntoa() at https://www.kb.cert.org/vuls/id/548487.
They've a vendor page for DragonFly at https://www.kb.cert.org/vuls/id/BLUU-AF4LH7 that will allow for marking of if DF is affected/has a patch or not.
Updated by deef over 4 years ago
- Due date set to 12/06/2016
- Status changed from New to Resolved
This has been already fixed by Matthew Dillon in commit 2947528a+:
https://gitweb.dragonflybsd.org/dragonfly.git/commit/2947528a83ae7a03df86a5688ef1725492b0f024
Actions