Issue #2969 has been updated by deef. Due date set to 12/06/2016 Status changed from New to Resolved
This has been already fixed by Matthew Dillon in commit 2947528a+: https://gitweb.dragonflybsd.org/dragonfly.git/commit/2947528a83ae7a03df86a5688ef1725492b0f024 ---------------------------------------- Bug #2969: CERT VU#548487 libc vulnerability in link_ntoa() http://bugs.dragonflybsd.org/issues/2969#change-13894 * Author: benjolitz * Status: Resolved * Priority: Normal * Assignee: * Category: * Target version: ---------------------------------------- Cert has published VU#548487 that states there is a potential for a buffer overflow in link_ntoa() at https://www.kb.cert.org/vuls/id/548487. They've a vendor page for DragonFly at https://www.kb.cert.org/vuls/id/BLUU-AF4LH7 that will allow for marking of if DF is affected/has a patch or not. -- You have received this notification because you have either subscribed to it, or are involved in it. To change your notification preferences, please click here: http://bugs.dragonflybsd.org/my/account
