glibc is vulnerable to privilege escalation. It was discovered that the glibc addmntent() function did not sanitize its input properly. A local attacker could possibly use this flaw to inject malformed lines into /etc/mtab via certain setuid mount helpers, if the attacker were allowed to mount to an arbitrary directory under their control.
frugalware.org/security/662
packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
seclists.org/fulldisclosure/2019/Jun/18
secunia.com/advisories/39900
secunia.com/advisories/43830
secunia.com/advisories/46397
security.gentoo.org/glsa/glsa-201011-01.xml
securitytracker.com/id?1024043
sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ab00f4eac8f4932211259ff87be83144f5211540
sourceware.org/git/?p=glibc.git;a=commit;h=ab00f4eac8f4932211259ff87be83144f5211540
www.debian.org/security/2010/dsa-2058
www.mandriva.com/security/advisories?name=MDVSA-2010:111
www.mandriva.com/security/advisories?name=MDVSA-2010:112
www.redhat.com/support/errata/RHSA-2011-0412.html
www.securityfocus.com/archive/1/520102/100/0/threaded
www.ubuntu.com/usn/USN-944-1
www.vmware.com/security/advisories/VMSA-2011-0012.html
www.vupen.com/english/advisories/2010/1246
www.vupen.com/english/advisories/2011/0863
access.redhat.com/errata/RHSA-2011:0412
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=559579
exchange.xforce.ibmcloud.com/vulnerabilities/59240
lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
seclists.org/bugtraq/2019/Jun/14