We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
Reserved 2019-03-20 | Published 2019-07-15 | Updated 2024-08-05 | Assigner dwfRe-mapping current loaded libray with malicious ELF file
sourceware.org/bugzilla/show_bug.cgi?id=22851
www.securityfocus.com/bid/109167 (109167)
support.f5.com/...?utm_source=f5support&%3Butm_medium=RSS
security-tracker.debian.org/tracker/CVE-2019-1010023 (CVE-2019-1010023)
ubuntu.com/security/CVE-2019-1010023 (CVE-2019-1010023)
nvd.nist.gov (CVE-2019-1010023)
Support options