First published: Tue Nov 19 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <2.31 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Debian Debian Linux | =10.0 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u8 2.36-9+deb12u7 2.40-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19126 is a vulnerability in the GNU C Library (glibc) that allows local attackers to restrict the possible mapping addresses for loaded libraries and bypass ASLR.
CVE-2019-19126 affects the x86-64 architecture by failing to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution.
Versions 2.28-10+deb10u2, 2.31-13+deb11u6, 2.31-13+deb11u7, 2.36-9+deb12u2, 2.36-9+deb12u3, and 2.37-12 of glibc are affected by CVE-2019-19126.
Local attackers can exploit CVE-2019-19126 by using the LD_PREFER_MAP_32BIT_EXEC environment variable to restrict the possible mapping addresses for loaded libraries.
CVE-2019-19126 has a severity rating of low with a score of 3.3.