Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-1010022

Опубликовано: 15 июл. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

РелизСтатусПримечание
bionic

ignored

devel

ignored

disco

ignored

end of life
eoan

ignored

esm-infra-legacy/trusty

DNE

esm-infra/bionic

ignored

esm-infra/focal

ignored

esm-infra/xenial

ignored

focal

ignored

precise/esm

DNE

Показывать по

Ссылки на источники

EPSS

Процентиль: 33%
0.00131
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

redhat
почти 7 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

CVSS3: 9.8
nvd
больше 6 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

CVSS3: 9.8
debian
больше 6 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Att ...

CVSS3: 9.8
github
больше 3 лет назад

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard.

EPSS

Процентиль: 33%
0.00131
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3