CVE-2019-1010022
ADVISORY - nistSummary
GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
EPSS Score: 0.00145 (0.359)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Restriction of Operations within the Bounds of a Memory Buffer
NIST
CREATED
UPDATED
ADVISORY IDCVE-2019-1010022
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
9.8criticalDebian
CREATED
UPDATED
ADVISORY IDCVE-2019-1010022
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
N/AlowUbuntu
CREATED
UPDATED
ADVISORY IDCVE-2019-1010022
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
9.8lowRed Hat
CVSS SCORE
N/AunspecifiedChainguard
CREATED
UPDATED
ADVISORY ID
CGA-v7x3-922x-m2jv
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
intheWild
CREATED
UPDATED
ADVISORY IDCVE-2019-1010022
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-