Do your applications use this vulnerable package?
Test your applications
Overview
** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat."
References
CVSS Score
9.8
low severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityHigh
-
AvailabilityHigh
- CVE
- CVE-2019-1010022
- CWE
- CWE-119
- Snyk ID
- SNYK-DEBIAN9-GLIBC-453364
- Disclosed
- 15 Jul, 2019
- Published
- 24 Jul, 2019