CVE-2011-1006Improper Restriction of Operations within the Bounds of a Memory Buffer in Libcgroup

Severity
7.2HIGHNVD
EPSS
0.1%
top 67.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 22
Latest updateMay 17

Description

Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common.c in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 allows local users to gain privileges via a crafted controller list on the command line of an application. NOTE: it is not clear whether this issue crosses privilege boundaries.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages3 packages

debiandebian/libcgroup< libcgroup 0.37.1-1 (bookworm)
Debianlibcgroup_project/libcgroup< 0.37.1-1+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-9wjp-w6p5-52xw: Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common2022-05-17
OSV
CVE-2011-1006: Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common2011-03-22

📋Vendor Advisories

2
Red Hat
libcgroup: Heap-based buffer overflow by converting list of controllers for given task into an array of strings2011-03-03
Debian
CVE-2011-1006: libcgroup - Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-comm...2011

💬Community

1
Bugzilla
CVE-2011-1006 libcgroup: Heap-based buffer overflow by converting list of controllers for given task into an array of strings2011-02-16