25
Root access vulnerability in glibc library impacts many Linux distros
(securityaffairs.com)
Confidentiality Integrity Availability
@BlanK0 @security the fix commit says the problem occurs when the program name is very long - so probably not very exploitable, as the program name is usually set in stone.
Thx for pointing that out 🤙
Symlink or copy/rename could trigger it, as long as there is a user writable area with execute perms? /home usually allows exec?
Also some of the exec* functions allow manipulating the argv[0], so possibly another vector there.