A CVE hasn't been assigned.

Presumably an attacker could manipulate the environment before an
application's libnuma call to have the uninitialised pointer point to
information in memory they'd like to extract, or cause a denial.

If an application that gained privileges (capabilities, setuid etc) uses
libnuma, this may allow access to move privileged data.

That said, probably it would only be libvirt:

$ apt-cache rdepends libnuma1
libnuma1
Reverse Depends:
  libvirt0
  libvirt-bin
  libhwloc5
  libvirt0
  libvirt-bin
  libnuma1:i386
  libnuma1:i386
  crafty
  rt-tests
  procenv
  numactl
  libhwloc5
  libvirt0
  libvirt-bin
  libnuma-dev
  libnuma-dbg
  irqbalance

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1441388

Title:
  numactl crashes with segfault

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/numactl/+bug/1441388/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to