Openwall GNU/*/Linux Information for VU#457759
glibc vulnerable to stack buffer overflow in DNS resolver
- Vendor Information Help Date Notified: 17 Feb 2016
- Statement Date: 19 Feb 2016
- Date Updated: 22 Feb 2016
"Openwall GNU/*/Linux is not affected. We use a fork of a version of glibc predating the introduction of this vulnerability.
We have previously patched the somewhat related GHOST vulnerability."
We are not aware of further vendor information regarding this vulnerability.
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.