GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
Improper Restriction of Operations within the Bounds of a Memory Buffer
-
Package | Type | OS Name | OS Version | Affected Ranges | Fix Versions |
---|---|---|---|---|---|
debian/glibc | deb | debian | 12 | >=2.36-9+deb12u4 | Not yet available |
debian/glibc | deb | debian | 13 | >=2.38-11 | Not yet available |
debian/glibc | deb | debian | unstable | >=2.38-11 | Not yet available |
debian/glibc | deb | debian | 11 | >=2.31-13+deb11u8 | Not yet available |
debian/glibc | deb | debian | 10 | >=2.28-10+deb10u1 | Not yet available |
Severity and metrics
No CVSS data available from this source.
3.9
3.9
CVE-2019-1010022
-
CVE-2019-1010022
-
-
-