First published: Mon Jul 15 2019(Updated: )
** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat."
Credit: josh@bress.net josh@bress.net josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | ||
debian/glibc | <=2.31-13+deb11u11<=2.31-13+deb11u10<=2.36-9+deb12u8<=2.36-9+deb12u7<=2.40-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1010022 is a vulnerability in GNU Libc that allows an attacker to bypass stack guard protection.
CVE-2019-1010022 has a severity rating of critical (9.8).
CVE-2019-1010022 affects GNU Libc by allowing attackers to bypass stack guard protection.
The attack vector for CVE-2019-1010022 is through exploiting a stack buffer overflow vulnerability and using this bypass vulnerability to bypass stack guard.
There is currently no known remedy or fix available for CVE-2019-1010022. It is recommended to stay updated with the latest security advisories and patches from the vendor.