SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   libcg Vendors:   libcg.sourceforge.net
libcgroup Lets Local Users Spoof NETLINK Messages
SecurityTracker Alert ID:  1025157
SecurityTracker URL:  http://securitytracker.com/id/1025157
CVE Reference:   CVE-2011-1022   (Links to External Site)
Date:  Mar 4 2011
Impact:   User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 0.37.1
Description:   A vulnerability was reported in libcgroup. A local user can enable processes to run with additional resources.

The software does not validate the origin of Netlink messages. A local user can send specially crafted Netlink messages to the cgrulesengd daemon to place processes into certain control groups, potentially allowing the processes to run with additional resources.

The vulnerability resides in 'src/daemon/cgrulesengd.c'.

Impact:   A local user can enable processes to run with additional resources.
Solution:   The vendor has issued a fix (0.37.1).
Vendor URL:  libcg.sourceforge.net/ (Links to External Site)
Cause:   Authentication error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Mar 4 2011 (Red Hat Issues Fix) libcgroup Lets Local Users Spoof NETLINK Messages
Red Hat has issued a fix for Red Hat Enterprise Linux 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC