GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
Exposure of Sensitive Information to an Unauthorized Actor
Exposure of Sensitive Information to an Unauthorized Actor
-
Package | Type | OS Name | OS Version | Affected Ranges | Fix Versions |
---|---|---|---|---|---|
debian/glibc | deb | debian | 12 | >=2.36-9+deb12u4 | Not yet available |
debian/glibc | deb | debian | unstable | >=2.38-11 | Not yet available |
debian/glibc | deb | debian | 11 | >=2.31-13+deb11u8 | Not yet available |
debian/glibc | deb | debian | 10 | >=2.28-10+deb10u1 | Not yet available |
debian/glibc | deb | debian | 13 | >=2.38-11 | Not yet available |
Severity and metrics
No CVSS data available from this source.
3.9
3.9
3.9
CVE-2019-1010024
-
CVE-2019-1010024
-
-
-