Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3075
configure project using --with-template=feature/build_libc make -C build glibc.patch cd build/glibc patch -p2 < /patch/to/attached/patch Binary hotfix are uploaded to pek-lpggp2:/folk/yhuang1/hotfix/hotfix6