GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 15 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 25 Oct 2024 02:00:00 +0000

Type Values Removed Values Added
Metrics threat_severity

Low

threat_severity

None


Thu, 24 Oct 2024 14:00:00 +0000

Type Values Removed Values Added
Metrics threat_severity

None

threat_severity

Low


cve-icon MITRE

Status: PUBLISHED

Assigner: dwf

Published:

Updated: 2024-11-15T15:04:27.415Z

Reserved: 2019-03-20T00:00:00

Link: CVE-2019-1010022

cve-icon Vulnrichment

Updated: 2024-08-05T03:07:18.071Z

cve-icon NVD

Status : Modified

Published: 2019-07-15T04:15:13.317

Modified: 2024-11-21T04:17:55.500

Link: CVE-2019-1010022

cve-icon Redhat

Severity :

Publid Date: 2019-03-20T00:00:00Z

Links: CVE-2019-1010022 - Bugzilla

cve-icon OpenCVE Enrichment

No data.