Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-1022 | First vendor Publication | 2011-03-22 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.1 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1022 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12695 | |||
Oval ID: | oval:org.mitre.oval:def:12695 | ||
Title: | DSA-2193-1 libcgroup -- several | ||
Description: | Several issues have been discovered in libcgroup, a library to control and monitor control groups: CVE-2011-1006 Heap-based buffer overflow by converting list of controllers for given task into an array of strings could lead to privilege escalation by a local attacker. CVE-2011-1022 libcgroup did not properly check the origin of Netlink messages, allowing a local attacker to send crafted Netlink messages which could lead to privilege escalation. The oldstable distribution does not contain libgroup packages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2193-1 CVE-2011-1006 CVE-2011-1022 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | libcgroup |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21523 | |||
Oval ID: | oval:org.mitre.oval:def:21523 | ||
Title: | RHSA-2011:0320: libcgroup security update (Important) | ||
Description: | The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0320-01 CVE-2011-1006 CVE-2011-1022 | Version: | 29 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | libcgroup |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23544 | |||
Oval ID: | oval:org.mitre.oval:def:23544 | ||
Title: | ELSA-2011:0320: libcgroup security update (Important) | ||
Description: | The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0320-01 CVE-2011-1006 CVE-2011-1022 | Version: | 13 |
Platform(s): | Oracle Linux 6 | Product(s): | libcgroup |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28066 | |||
Oval ID: | oval:org.mitre.oval:def:28066 | ||
Title: | DEPRECATED: ELSA-2011-0320 -- libcgroup security update (important) | ||
Description: | [0.36-6.1] - Fixed buffer overflow when parsing cgexec command line parameters. - Added checking of source of netlink messages to cgrulesengd daemon. - Resolves: CVE-2011-1006 CVE-2011-1022 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-0320 CVE-2011-1006 CVE-2011-1022 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | libcgroup |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-07-09 | Name : RedHat Update for libcgroup RHSA-2011:0320-01 File : nvt/gb_RHSA-2011_0320-01_libcgroup.nasl |
2011-06-03 | Name : Fedora Update for libcgroup FEDORA-2011-2570 File : nvt/gb_fedora_2011_2570_libcgroup_fc13.nasl |
2011-05-12 | Name : Debian Security Advisory DSA 2193-1 (libcgroup) File : nvt/deb_2193_1.nasl |
2011-04-01 | Name : Fedora Update for libcgroup FEDORA-2011-2631 File : nvt/gb_fedora_2011_2631_libcgroup_fc14.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
72519 | Control Group Configuration Library (libcgroup / libcg) tools/tools-common.c ... |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_libcgroup-devel-110304.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_libcgroup-devel-110314.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0320.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110303_libcgroup_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2011-05-27 | Name : The remote Fedora host is missing a security update. File : fedora_2011-2570.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_libcgroup-devel-110304.nasl - Type : ACT_GATHER_INFO |
2011-04-11 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_libcgroup-devel-110303.nasl - Type : ACT_GATHER_INFO |
2011-03-27 | Name : The remote Fedora host is missing a security update. File : fedora_2011-2631.nasl - Type : ACT_GATHER_INFO |
2011-03-27 | Name : The remote Fedora host is missing a security update. File : fedora_2011-2638.nasl - Type : ACT_GATHER_INFO |
2011-03-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2193.nasl - Type : ACT_GATHER_INFO |
2011-03-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0320.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:05:37 |
|
2024-11-28 12:25:03 |
|
2021-05-04 12:14:07 |
|
2021-04-22 01:15:19 |
|
2020-05-23 01:44:00 |
|
2020-05-23 00:27:56 |
|
2016-04-26 20:36:03 |
|
2014-06-14 13:30:28 |
|
2014-02-17 11:00:54 |
|
2013-05-10 22:55:59 |
|