Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-1010025

Опубликовано: 15 июл. 2019
Источник: debian
EPSS Низкий

Описание

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcunfixedpackage

Примечания

  • Not treated as a security issue by upstream

  • https://sourceware.org/bugzilla/show_bug.cgi?id=22853

EPSS

Процентиль: 79%
0.01239
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 6 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

CVSS3: 2.9
redhat
больше 6 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

CVSS3: 5.3
nvd
больше 6 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

CVSS3: 5.3
github
больше 3 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc.

EPSS

Процентиль: 79%
0.01239
Низкий