cve/2019/CVE-2019-1010022.md

28 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-1010022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010022)
![](https://img.shields.io/static/v1?label=Product&message=glibc&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Mitigation%20bypass&color=brighgreen)
### Description
** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat."
### POC
#### Reference
- https://sourceware.org/bugzilla/show_bug.cgi?id=22850
- https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/DanMolz/wiz-scripts
- https://github.com/GrigGM/05-virt-04-docker-hw
- https://github.com/PajakAlexandre/wik-dps-tp02
- https://github.com/cdupuis/image-api
- https://github.com/fokypoky/places-list
- https://github.com/garethr/snykout
- https://github.com/madchap/opa-tests
- https://github.com/marklogic/marklogic-docker
- https://github.com/marklogic/marklogic-kubernetes