The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2193-1 | libcgroup security update |
EUVD |
EUVD-2011-1039 | The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T22:14:27.029Z
Reserved: 2011-02-14T00:00:00
Link: CVE-2011-1022
No data.
Status : Deferred
Published: 2011-03-22T17:55:01.987
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-1022
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD