Ubuntu Information for VU#457759

glibc vulnerable to stack buffer overflow in DNS resolver

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Ubuntu has released a patched version of glibc. Please see the security advisory at the URL below:

Vendor References

http://www.ubuntu.com/usn/usn-2900-1/

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.