@[email protected] to [email protected] • 10 months agoRoot access vulnerability in glibc library impacts many Linux distrossecurityaffairs.comexternal-linkmessage-square3fedilinkarrow-up123arrow-down10cross-posted to: [email protected]
arrow-up123arrow-down1external-linkRoot access vulnerability in glibc library impacts many Linux distrossecurityaffairs.com@[email protected] to [email protected] • 10 months agomessage-square3fedilinkcross-posted to: [email protected]
minus-squareimmibislinkfedilink4•10 months ago@BlanK0 @security the fix commit says the problem occurs when the program name is very long - so probably not very exploitable, as the program name is usually set in stone.
minus-square@[email protected]linkfedilink2•edit-210 months agoSymlink or copy/rename could trigger it, as long as there is a user writable area with execute perms? /home usually allows exec? Also some of the exec* functions allow manipulating the argv[0], so possibly another vector there.
@BlanK0 @security the fix commit says the problem occurs when the program name is very long - so probably not very exploitable, as the program name is usually set in stone.
Thx for pointing that out 🤙
Symlink or copy/rename could trigger it, as long as there is a user writable area with execute perms? /home usually allows exec?
Also some of the exec* functions allow manipulating the argv[0], so possibly another vector there.