CVE-2016-6323 — Improper Access Control in Glibc
Severity
7.5HIGHNVD
EPSS
1.1%
top 21.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 7
Latest updateMay 14
Description
The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
Also affects: Fedora 23, 24, 25
🔴Vulnerability Details
3GHSA▶
GHSA-xrcf-wxwq-5jmq: The makecontext function in the GNU C Library (aka glibc or libc6) before 2↗2022-05-14
CVEList▶
CVE-2016-6323: The makecontext function in the GNU C Library (aka glibc or libc6) before 2↗2016-10-07
OSV▶
CVE-2016-6323: The makecontext function in the GNU C Library (aka glibc or libc6) before 2↗2016-10-07
📋Vendor Advisories
3💬Community
3Bugzilla▶
CVE-2016-6323 glibc: Missing unwind info in __startcontext causes infinite loop in _Unwind_Backtrace [fedora-all]↗2016-10-10
Bugzilla▶
CVE-2016-6323 glibc: Missing unwind info in __startcontext causes infinite loop in _Unwind_Backtrace↗2016-10-10
Bugzilla▶
CVE-2016-6323 glibc-arm-linux-gnu: glibc: Missing unwind info in __startcontext causes infinite loop in _Unwind_Backtrace [fedora-all]↗2016-10-10