glibc is vulnerable to arbitrary code execution. A use-after-free in the glob()
function when expanding ~user allows an attacker to execute arbitrary code on the host OS.
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index
access.redhat.com/errata/RHSA-2020:4444
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
lists.debian.org/debian-lts-announce/2022/10/msg00021.html
security.gentoo.org/glsa/202101-20
security.netapp.com/advisory/ntap-20200511-0005/
sourceware.org/bugzilla/show_bug.cgi?id=25414
sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c
usn.ubuntu.com/4416-1/