First published: Wed Jun 01 2016(Updated: )
Last updated 24 July 2024
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-6 | |
GNU C Library | <2.24 | |
openSUSE | =42.1 | |
openSUSE | =13.2 | |
Fedora | =23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1234 is rated as a high-severity vulnerability due to the potential for denial of service.
To fix CVE-2016-1234, update the GNU C Library (glibc) to version 2.24 or later.
CVE-2016-1234 affects glibc versions prior to 2.24, including specific versions on openSUSE and Fedora.
CVE-2016-1234 is a stack-based buffer overflow vulnerability.
CVE-2016-1234 can be exploited by context-dependent attackers, potentially allowing remote denial of service.