• @shadowintheday2
    link
    English
    964 months ago

    "A qsort vulnerability is due to a missing bounds check and can lead to memory corruption. It has been present in all versions of glibc since 1992. "

    This one amazes me. Imagine how many vulnerabilities future researchers will discover in ancient software that persisted/persist for decades.

    • @[email protected]
      link
      fedilink
      65
      edit-2
      4 months ago

      That’s not the main part of the article, just a footnote, for anyone wondering.

      The flaw resides in the glibc’s syslog function, an attacker can exploit the flaw to gain root access through a privilege escalation.

      The vulnerability was introduced in glibc 2.37 in August 2022.

        • @StefanT
          link
          214 months ago

          glibc is a library, gcc is the compiler.

        • @[email protected]
          link
          fedilink
          54 months ago

          You are probably confusing the glibc with gcc and g++. Glibc is an implementation of the C standard library, made by GNU (thats where the g in the name comes from).

          If you were to look into it, it uses the syscalls to tell the underlying computer system what to do when you call functions, such as printf.

          If you want to read more, see here

    • @[email protected]
      link
      fedilink
      334 months ago

      C is just crazy. You accidentally forget to put the bounds in a sorting function, and now you are root.

    • @[email protected]
      link
      fedilink
      64 months ago

      According to the link in the article, the qsort() bug can only be triggered with a non-transitive cmp() function. Would such a cmp function ever be useful?

      • @Giooschi
        link
        English
        44 months ago

        You don’t necessarily have to write a non-transitive cmp() function willingly, it may happen that you write one without realizing due to some edge cases where it’s not transitive.