Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-1010025

Опубликовано: 15 июл. 2019
Источник: redhat
CVSS3: 2.9
EPSS Низкий

Описание

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

Отчет

This is does not affect the package glibc as shipped with Red Hat Enterprise Linux 5, 6,7 and 8. The bug related to this CVE is not exploitable.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5glibcNot affected
Red Hat Enterprise Linux 6glibcNot affected
Red Hat Enterprise Linux 7glibcNot affected
Red Hat Enterprise Linux 8glibcNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1737445glibc: information disclosure of heap addresses of pthread_created thread

EPSS

Процентиль: 79%
0.01239
Низкий

2.9 Low

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 6 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

CVSS3: 5.3
nvd
больше 6 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

CVSS3: 5.3
debian
больше 6 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Att ...

CVSS3: 5.3
github
больше 3 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc.

EPSS

Процентиль: 79%
0.01239
Низкий

2.9 Low

CVSS3