Vulnerability Description
GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/109162Third Party AdvisoryVDB Entry
- https://security-tracker.debian.org/tracker/CVE-2019-1010024
- https://sourceware.org/bugzilla/show_bug.cgi?id=22852ExploitIssue TrackingThird Party Advisory
- https://support.f5.com/csp/article/K06046097
- https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medi
- https://ubuntu.com/security/CVE-2019-1010024
- http://www.securityfocus.com/bid/109162Third Party AdvisoryVDB Entry
- https://security-tracker.debian.org/tracker/CVE-2019-1010024
- https://sourceware.org/bugzilla/show_bug.cgi?id=22852ExploitIssue TrackingThird Party Advisory
- https://support.f5.com/csp/article/K06046097
- https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medi
- https://ubuntu.com/security/CVE-2019-1010024
FAQ
What is CVE-2019-1010024?
CVE-2019-1010024 is a vulnerability with a CVSS score of 5.3 (MEDIUM). GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is bei...
How severe is CVE-2019-1010024?
CVE-2019-1010024 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-1010024?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc.