Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-1294

Опубликовано: 17 апр. 2007
Источник: redhat
EPSS Низкий

Описание

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

Отчет

This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=437114kernel: setrlimit(RLIMIT_CPUINFO) with zero value doesn't inherit properly across children

EPSS

Процентиль: 12%
0.00039
Низкий

Связанные уязвимости

ubuntu
почти 18 лет назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

nvd
почти 18 лет назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

debian
почти 18 лет назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check ...

github
почти 4 года назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

oracle-oval
больше 17 лет назад

ELSA-2008-0612: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 12%
0.00039
Низкий