Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-1022

Опубликовано: 22 мар. 2011
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 2.1

Описание

The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

0.38-1ubuntu2
dapper

DNE

devel

not-affected

0.38-1ubuntu2
esm-apps/bionic

not-affected

0.38-1ubuntu2
esm-apps/xenial

not-affected

0.38-1ubuntu2
esm-infra-legacy/trusty

not-affected

0.38-1ubuntu2
hardy

DNE

karmic

ignored

end of life
lucid

ignored

end of life

Показывать по

Ссылки на источники

EPSS

Процентиль: 26%
0.00086
Низкий

2.1 Low

CVSS2

Связанные уязвимости

redhat
больше 14 лет назад

The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.

nvd
больше 14 лет назад

The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.

debian
больше 14 лет назад

The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrul ...

github
около 3 лет назад

The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.

oracle-oval
больше 14 лет назад

ELSA-2011-0320: libcgroup security update (IMPORTANT)

EPSS

Процентиль: 26%
0.00086
Низкий

2.1 Low

CVSS2