Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-1294

Опубликовано: 02 мая 2008
Источник: debian
EPSS Низкий

Описание

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.22-1package

EPSS

Процентиль: 11%
0.00039
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

redhat
больше 18 лет назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

nvd
больше 17 лет назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

github
больше 3 лет назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

oracle-oval
около 17 лет назад

ELSA-2008-0612: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 11%
0.00039
Низкий