Vulnerability Description
GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | - |
Related Weaknesses (CWE)
References
- https://security-tracker.debian.org/tracker/CVE-2019-1010022
- https://sourceware.org/bugzilla/show_bug.cgi?id=22850ExploitIssue TrackingThird Party Advisory
- https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
- https://ubuntu.com/security/CVE-2019-1010022
- https://security-tracker.debian.org/tracker/CVE-2019-1010022
- https://sourceware.org/bugzilla/show_bug.cgi?id=22850ExploitIssue TrackingThird Party Advisory
- https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
- https://ubuntu.com/security/CVE-2019-1010022
FAQ
What is CVE-2019-1010022?
CVE-2019-1010022 is a vulnerability with a CVSS score of 9.8 (CRITICAL). GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability...
How severe is CVE-2019-1010022?
CVE-2019-1010022 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-1010022?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc.