Debian Libcgroup vulnerabilities
3 known vulnerabilities affecting debian/libcgroup.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1LOW2
Vulnerabilities
Page 1 of 1
CVE-2018-14348LOWCVSS 8.1fixed in libcgroup 0.41-8.1 (bookworm)2018
CVE-2018-14348 [HIGH] CVE-2018-14348: libcgroup - libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardl...
libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardless of the configured umask, leading to disclosure of information.
Scope: local
bookworm: resolved (fixed in 0.41-8.1)
bullseye: resolved (fixed in 0.41-8.1)
forky: resolved (fixed in 0.41-8.1)
sid: resolved (fixed in 0.41-8.1)
trixie: resolved (fixed in 0.41-8.1)
debian
CVE-2011-1006HIGHCVSS 7.2fixed in libcgroup 0.37.1-1 (bookworm)2011
CVE-2011-1006 [HIGH] CVE-2011-1006: libcgroup - Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-comm...
Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common.c in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 allows local users to gain privileges via a crafted controller list on the command line of an application. NOTE: it is not clear whether this issue crosses privilege boundaries.
Scope: local
bookworm:
debian
CVE-2011-1022LOWCVSS 2.1fixed in libcgroup 0.37.1-1 (bookworm)2011
CVE-2011-1022 [LOW] CVE-2011-1022: libcgroup - The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in ...
The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.
Scope: local
bookworm: resolved (fixed in 0.37.1-1)
bulls
debian