top | item 46182105 Privilege Escalation in Fedora Linux: Exploiting ABRT for Root 3 points| ementally | 2 months ago |initblog.com 2 comments order hn newest westurner|2 months ago g_autofree char *docker_inspect_cmdline = NULL; if (root_dir != NULL) docker_inspect_cmdline = g_strdup_printf("chroot %s /bin/sh -c \"docker inspect %s\"", root_dir, container_id); else docker_inspect_cmdline = g_strdup_printf("docker inspect %s", container_id); What static and dynamic analysis tools and rules could have found this vuln? westurner|2 months ago Almost regex: .*cmd.*=.*printf.*%s
westurner|2 months ago g_autofree char *docker_inspect_cmdline = NULL; if (root_dir != NULL) docker_inspect_cmdline = g_strdup_printf("chroot %s /bin/sh -c \"docker inspect %s\"", root_dir, container_id); else docker_inspect_cmdline = g_strdup_printf("docker inspect %s", container_id); What static and dynamic analysis tools and rules could have found this vuln? westurner|2 months ago Almost regex: .*cmd.*=.*printf.*%s
westurner|2 months ago
westurner|2 months ago