Gentoo Linux Information for VU#457759

glibc vulnerable to stack buffer overflow in DNS resolver

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

glibc has been updated with the patch on Gentoo. Please see the Gentoo security advisory at the URL below.

Vendor References

None

Addendum

https://security.gentoo.org/glsa/201602-02

If you have feedback, comments, or additional information about this vulnerability, please send us email.