First published: Mon Jul 15 2019(Updated: )
** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat."
Credit: josh@bress.net josh@bress.net josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | ||
debian/glibc | <=2.31-13+deb11u11<=2.31-13+deb11u10<=2.36-9+deb12u9<=2.36-9+deb12u7<=2.40-3<=2.40-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this GNU Libc vulnerability is CVE-2019-1010024.
The impact of this vulnerability is that an attacker may bypass ASLR using cache of thread stack and heap.
The affected software component is glibc.
No fix is available as this vulnerability is being treated as a non-security bug with no real threat.
You can find more information about this vulnerability at the following references: SecurityFocus BID 109162, Debian Security Tracker CVE-2019-1010024, and Sourceware Bugzilla Bug 22852.