Description
The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2193-1 | libcgroup security update |
EUVD |
EUVD-2011-1039 | The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message. |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T22:14:27.029Z
Reserved: 2011-02-14T00:00:00.000Z
Link: CVE-2011-1022
No data.
Status : Modified
Published: 2011-03-22T17:55:01.987
Modified: 2026-04-29T01:13:23.040
Link: CVE-2011-1022
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD