The libcgroup packages provide tools and libraries to control and monitorcontrol groups.A heap-based buffer overflow flaw was found in the way libcgroup converteda list of user-provided controllers for a particular task into an array ofstrings. A local attacker could use this flaw to escalate their privilegesvia a specially-crafted list of controllers. (CVE-2011-1006)It was discovered that libcgroup did not properly check the origin ofNetlink messages. A local attacker could use this flaw to send craftedNetlink messages to the cgrulesengd daemon, causing it to put processesinto one or more existing control groups, based on the attacker's choosing,possibly allowing the particular tasks to run with more resources (memory,CPU, etc.) than originally intended. (CVE-2011-1022)Red Hat would like to thank Nelson Elhage for reporting the CVE-2011-1006issue.All libcgroup users should upgrade to these updated packages, which containbackported patches to correct these issues.