CVE-2011-1022Libcgroup vulnerability

CWE-2648 documents7 sources
Severity
2.1LOWNVD
EPSS
0.0%
top 87.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 22
Latest updateMay 17

Description

The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.

CVSS vector

AV:L/AC:L/C:N/I:P/A:NExploitability: 3.9 | Impact: 2.9

Affected Packages3 packages

debiandebian/libcgroup< libcgroup 0.37.1-1 (bookworm)
Debianlibcgroup_project/libcgroup< 0.37.1-1+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-669f-5h8c-h58m: The cgre_receive_netlink_msg function in daemon/cgrulesengd2022-05-17
OSV
CVE-2011-1022: The cgre_receive_netlink_msg function in daemon/cgrulesengd2011-03-22

💥Exploits & PoCs

1
Exploit-DB
NEdit 5.5 - Format String2011-04-14

📋Vendor Advisories

2
Red Hat
libcgroup: Uncheck origin of NETLINK messages2011-02-18
Debian
CVE-2011-1022: libcgroup - The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in ...2011

💬Community

2
Bugzilla
CVE-2011-1022 libcgroup: Uncheck origin of NETLINK messages [fedora-all]2011-02-25
Bugzilla
CVE-2011-1022 libcgroup: Uncheck origin of NETLINK messages2011-02-25