First published: Fri Jun 10 2016(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
SUSE Linux | =42.1 | |
SUSE Linux | =13.2 | |
GNU C Library (glibc) | <2.24 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-7 2.41-3 | |
debian/libtirpc | 1.3.1-1+deb11u1 1.3.3+ds-1 1.3.4+ds-1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4429 has a severity rating that suggests it can lead to a denial of service condition.
To fix CVE-2016-4429, update the GNU C Library (glibc) to the latest version provided by your Linux distribution.
CVE-2016-4429 can cause application crashes and lead to service outages due to a stack-based buffer overflow.
CVE-2016-4429 affects versions of GNU C Library prior to 2.24.
CVE-2016-4429 impacts multiple platforms including various versions of Ubuntu, openSUSE, and Android.