Debian GNU/Linux Information for VU#457759

glibc vulnerable to stack buffer overflow in DNS resolver

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Debian has released glibc updates containing the patches. Please see the announcements below:

Vendor References

https://lists.debian.org/debian-security-announce/2016/msg00050.html
https://lists.debian.org/debian-security-announce/2016/msg00051.html
https://lists.debian.org/debian-lts-announce/2016/02/msg00009.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.