Red Hat, Inc. Information for VU#457759
glibc vulnerable to stack buffer overflow in DNS resolver
- Vendor Information Help Date Notified: 17 Feb 2016
- Statement Date:
- Date Updated: 17 Feb 2016
Status
Affected
Vendor Statement
No statement is currently available from the vendor regarding this vulnerability.
Vendor Information
glibc has been updated with the patch. Please see the Red Hat security advisory at the URL below.
Vendor References
https://access.redhat.com/security/cve/CVE-2015-7547
Addendum
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.