Vulnerability Description
The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Balbir Singh | Libcgroup | <= 0.37 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=615987Patch
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056683.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056734.html
- http://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html
- http://openwall.com/lists/oss-security/2011/02/25/11Patch
- http://openwall.com/lists/oss-security/2011/02/25/12Patch
- http://openwall.com/lists/oss-security/2011/02/25/14
- http://openwall.com/lists/oss-security/2011/02/25/6Patch
- http://openwall.com/lists/oss-security/2011/02/25/9Patch
- http://secunia.com/advisories/43611Vendor Advisory
- http://secunia.com/advisories/43758Vendor Advisory
- http://secunia.com/advisories/43891
- http://secunia.com/advisories/44093
- http://sourceforge.net/mailarchive/message.php?msg_id=26598749Patch
- http://sourceforge.net/mailarchive/message.php?msg_id=27102603Patch
FAQ
What is CVE-2011-1022?
CVE-2011-1022 is a vulnerability with a CVSS score of 2.1 (LOW). The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages ori...
How severe is CVE-2011-1022?
CVE-2011-1022 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1022?
Check the references section above for vendor advisories and patch information. Affected products include: Balbir Singh Libcgroup.