Computer Security
[EN] securityvulns.ru no-pyccku


libcgroup security vulnerabilities
Published:23.03.2011
Source:
SecurityVulns ID:11527
Type:library
Threat Level:
6/10
Description:Buffer overflow, privilege escalation.
CVE:CVE-2011-1022 (The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.)
 CVE-2011-1006 (Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common.c in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 allows local users to gain privileges via a crafted controller list on the command line of an application. NOTE: it is not clear whether this issue crosses privilege boundaries.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2193-1] libcgroup security update (23.03.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod