Hi

On Mon, Oct 02, 2017 at 09:23:05PM +0200, Moritz Muehlenhoff wrote:
> On Sat, Jan 21, 2017 at 05:58:34PM +0100, Salvatore Bonaccorso wrote:
> > Source: hesiod
> > Version: 3.2.1-3
> > Severity: normal
> > Tags: upstream patch security
> > Forwarded: https://github.com/achernya/hesiod/pull/10
> > 
> > Hi,
> > 
> > the following vulnerability was published for hesiod.
> > 
> > CVE-2016-10152[0]:
> > Use of hard-coded DNS domain if configuration file cannot be read
> 
> What's the status? This bug is over eight months old.

Looks as well that the upstream pull request contains a 'validated'
patch, so that bug should at least be fixed for buster.

Regards,
Salvatore

Reply via email to