Settings

Theme

Privilege Escalation in Fedora Linux: Exploiting ABRT for Root

initblog.com

3 points by ementally 7 days ago · 2 comments

Reader

westurner 7 days ago

  g_autofree char *docker_inspect_cmdline = NULL;
  if (root_dir != NULL)
    docker_inspect_cmdline = g_strdup_printf("chroot %s /bin/sh -c \"docker inspect %s\"", root_dir, container_id);
  else
    docker_inspect_cmdline = g_strdup_printf("docker inspect %s", container_id);
What static and dynamic analysis tools and rules could have found this vuln?

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection