Rapid7 Vulnerability & Exploit Database

RHSA-2011:0320: libcgroup security update

Back to Search

RHSA-2011:0320: libcgroup security update

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
03/22/2011
Created
07/25/2018
Added
03/22/2011
Modified
07/04/2017

Description

The libcgroup packages provide tools and libraries to control and monitorcontrol groups.A heap-based buffer overflow flaw was found in the way libcgroup converteda list of user-provided controllers for a particular task into an array ofstrings. A local attacker could use this flaw to escalate their privilegesvia a specially-crafted list of controllers. (CVE-2011-1006)It was discovered that libcgroup did not properly check the origin ofNetlink messages. A local attacker could use this flaw to send craftedNetlink messages to the cgrulesengd daemon, causing it to put processesinto one or more existing control groups, based on the attacker's choosing,possibly allowing the particular tasks to run with more resources (memory,CPU, etc.) than originally intended. (CVE-2011-1022)Red Hat would like to thank Nelson Elhage for reporting the CVE-2011-1006issue.All libcgroup users should upgrade to these updated packages, which containbackported patches to correct these issues.

Solution(s)

  • redhat-upgrade-libcgroup
  • redhat-upgrade-libcgroup-debuginfo
  • redhat-upgrade-libcgroup-devel
  • redhat-upgrade-libcgroup-pam

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;