A heap-based buffer overflow flaw was found in the way libcgroup,
control groups controlling and monitoring infrastructure, converted
list of user provided controllers for particular task, dedicated to
run the task in given control groups, into an array of strings.
A local attacker could use this flaw to escalate their privileges
via a specially-crafted list of controllers.
Red Hat would like to thank Nelson Elhage for reporting this issue.
This issue affects the version of the libcgroup package, as shipped
with Red Hat Enterprise Linux 6.
This issue affects the versions of the libcgroup package, as shipped
with Fedora release of 13 and 14.
Created attachment 479302 [details]
The patch is obviously very simple, just check if nr. of controllers is in valid range.
The CVE identifier of CVE-2011-1006 has been assigned to this issue.
This issue has been addressed in following products:
Red Hat Enterprise Linux 6
Via RHSA-2011:0320 https://rhn.redhat.com/errata/RHSA-2011-0320.html