Project

General

Profile

Actions

Bug #2969

closed

CERT VU#548487 libc vulnerability in link_ntoa()

Added by Anonymous about 5 years ago. Updated over 1 year ago.

Status:
Resolved
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
Start date:
12/06/2016
Due date:
12/06/2016
% Done:

0%

Estimated time:

Description

Cert has published VU#548487 that states there is a potential for a buffer overflow in link_ntoa() at https://www.kb.cert.org/vuls/id/548487.

They've a vendor page for DragonFly at https://www.kb.cert.org/vuls/id/BLUU-AF4LH7 that will allow for marking of if DF is affected/has a patch or not.

Actions #1

Updated by deef over 1 year ago

  • Due date set to 12/06/2016
  • Status changed from New to Resolved

This has been already fixed by Matthew Dillon in commit 2947528a+:

https://gitweb.dragonflybsd.org/dragonfly.git/commit/2947528a83ae7a03df86a5688ef1725492b0f024

Actions

Also available in: Atom PDF