Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-1022

Опубликовано: 18 фев. 2011
Источник: redhat
CVSS2: 3.3

Описание

The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=680409libcgroup: Uncheck origin of NETLINK messages

3.3 Low

CVSS2

Связанные уязвимости

ubuntu
больше 14 лет назад

The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.

nvd
больше 14 лет назад

The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.

debian
больше 14 лет назад

The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrul ...

github
около 3 лет назад

The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.

oracle-oval
больше 14 лет назад

ELSA-2011-0320: libcgroup security update (IMPORTANT)

3.3 Low

CVSS2