First published: Mon Jul 15 2019(Updated: )
** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability."
Credit: josh@bress.net josh@bress.net josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | ||
debian/glibc | <=2.31-13+deb11u11<=2.31-13+deb11u10<=2.36-9+deb12u8<=2.36-9+deb12u7<=2.40-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1010025 is a vulnerability in GNU Libc that allows an attacker to guess the heap addresses of pthread_created thread.
The impact of CVE-2019-1010025 is that an attacker may guess the heap addresses of pthread_created thread.
The component affected by CVE-2019-1010025 is glibc.
The severity of CVE-2019-1010025 is medium.
There is no known remedy to mitigate CVE-2019-1010025 at this time.