First published: Fri Oct 07 2016(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | <=2.24 | |
SUSE Linux | =13.2 | |
Fedora | =23 | |
Fedora | =24 | |
Fedora | =25 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-7 2.41-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6323 has a medium severity rating, primarily impacting ARM EABI (32-bit) platforms.
You can fix CVE-2016-6323 by upgrading to glibc version 2.25 or later.
CVE-2016-6323 affects glibc versions prior to 2.25, specifically up to 2.24.
CVE-2016-6323 may allow context-dependent attackers to cause a denial of service, leading to system hangs.
CVE-2016-6323 specifically affects ARM EABI (32-bit) platforms using the affected versions of glibc.