GSD-2011-1022
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2011-1022",
"description": "The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.",
"id": "GSD-2011-1022",
"references": [
"https://www.suse.com/security/cve/CVE-2011-1022.html",
"https://www.debian.org/security/2011/dsa-2193",
"https://access.redhat.com/errata/RHSA-2011:0320",
"https://linux.oracle.com/cve/CVE-2011-1022.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-1022"
],
"details": "The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.",
"id": "GSD-2011-1022",
"modified": "2023-12-13T01:19:08.116799Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1022",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056683.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056683.html"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056734.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056734.html"
},
{
"name": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html"
},
{
"name": "http://secunia.com/advisories/43611",
"refsource": "MISC",
"url": "http://secunia.com/advisories/43611"
},
{
"name": "http://secunia.com/advisories/43758",
"refsource": "MISC",
"url": "http://secunia.com/advisories/43758"
},
{
"name": "http://secunia.com/advisories/43891",
"refsource": "MISC",
"url": "http://secunia.com/advisories/43891"
},
{
"name": "http://secunia.com/advisories/44093",
"refsource": "MISC",
"url": "http://secunia.com/advisories/44093"
},
{
"name": "http://sourceforge.net/projects/libcg/files/libcgroup/v0.37.1/libcgroup-0.37.1.tar.bz2/download",
"refsource": "MISC",
"url": "http://sourceforge.net/projects/libcg/files/libcgroup/v0.37.1/libcgroup-0.37.1.tar.bz2/download"
},
{
"name": "http://www.debian.org/security/2011/dsa-2193",
"refsource": "MISC",
"url": "http://www.debian.org/security/2011/dsa-2193"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2011-0320.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0320.html"
},
{
"name": "http://www.vupen.com/english/advisories/2011/0679",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0679"
},
{
"name": "http://www.vupen.com/english/advisories/2011/0774",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2011/0774"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=615987",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=615987"
},
{
"name": "http://openwall.com/lists/oss-security/2011/02/25/11",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/02/25/11"
},
{
"name": "http://openwall.com/lists/oss-security/2011/02/25/12",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/02/25/12"
},
{
"name": "http://openwall.com/lists/oss-security/2011/02/25/14",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/02/25/14"
},
{
"name": "http://openwall.com/lists/oss-security/2011/02/25/6",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/02/25/6"
},
{
"name": "http://openwall.com/lists/oss-security/2011/02/25/9",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2011/02/25/9"
},
{
"name": "http://sourceforge.net/mailarchive/message.php?msg_id=26598749",
"refsource": "MISC",
"url": "http://sourceforge.net/mailarchive/message.php?msg_id=26598749"
},
{
"name": "http://sourceforge.net/mailarchive/message.php?msg_id=27102603",
"refsource": "MISC",
"url": "http://sourceforge.net/mailarchive/message.php?msg_id=27102603"
},
{
"name": "http://www.securityfocus.com/bid/46578",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/46578"
},
{
"name": "http://www.securitytracker.com/id?1025157",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1025157"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=680409",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680409"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "0.37",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.37:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.32.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.35.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.36.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.36.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.32.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:balbir_singh:libcgroup:0.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-1022"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "46578",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/46578"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=680409",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680409"
},
{
"name": "[oss-security] 20110225 Re: CVE request: libcgroup: Failure to verify netlink messages",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/02/25/11"
},
{
"name": "DSA-2193",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2011/dsa-2193"
},
{
"name": "[oss-security] 20110225 Re: CVE request: libcgroup: Failure to verify netlink messages",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/02/25/12"
},
{
"name": "[libcg-devel] 20110218 [PATCH 2/2] cgrulesengd: Ignore netlink messages that don\u0027t come from the kernel.",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://sourceforge.net/mailarchive/message.php?msg_id=27102603"
},
{
"name": "43611",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43611"
},
{
"name": "http://sourceforge.net/projects/libcg/files/libcgroup/v0.37.1/libcgroup-0.37.1.tar.bz2/download",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://sourceforge.net/projects/libcg/files/libcgroup/v0.37.1/libcgroup-0.37.1.tar.bz2/download"
},
{
"name": "RHSA-2011:0320",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0320.html"
},
{
"name": "[oss-security] 20110224 CVE request: libcgroup: Failure to verify netlink messages",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/02/25/6"
},
{
"name": "[oss-security] 20110225 Re: CVE request: libcgroup: Failure to verify netlink messages",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/02/25/9"
},
{
"name": "43758",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43758"
},
{
"name": "[oss-security] 20110225 Re: CVE request: libcgroup: Failure to verify netlink messages",
"refsource": "MLIST",
"tags": [],
"url": "http://openwall.com/lists/oss-security/2011/02/25/14"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=615987",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=615987"
},
{
"name": "[libcg-devel] 20101115 Fwd: libcgroup netlink",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://sourceforge.net/mailarchive/message.php?msg_id=26598749"
},
{
"name": "ADV-2011-0679",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0679"
},
{
"name": "ADV-2011-0774",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2011/0774"
},
{
"name": "FEDORA-2011-2638",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056734.html"
},
{
"name": "FEDORA-2011-2631",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056683.html"
},
{
"name": "43891",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/43891"
},
{
"name": "44093",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/44093"
},
{
"name": "openSUSE-SU-2011:0316",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html"
},
{
"name": "1025157",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1025157"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2011-09-07T03:15Z",
"publishedDate": "2011-03-22T17:55Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…