A heap-based buffer overflow flaw was found in the way libcgroup, control groups controlling and monitoring infrastructure, converted list of user provided controllers for particular task, dedicated to run the task in given control groups, into an array of strings. A local attacker could use this flaw to escalate their privileges via a specially-crafted list of controllers. Acknowledgements: Red Hat would like to thank Nelson Elhage for reporting this issue.
This issue affects the version of the libcgroup package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the versions of the libcgroup package, as shipped with Fedora release of 13 and 14.
Created attachment 479302 [details] patch The patch is obviously very simple, just check if nr. of controllers is in valid range.
The CVE identifier of CVE-2011-1006 has been assigned to this issue.
Upstream patch: http://libcg.git.sourceforge.net/git/gitweb.cgi?p=libcg/libcg;a=commitdiff;h=5ae8aea1ecd60c439121d3329d8eaabf13d292c1
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0320 https://rhn.redhat.com/errata/RHSA-2011-0320.html