Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-1294

Опубликовано: 02 мая 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 2.1

Описание

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

feisty

DNE

gutsy

DNE

hardy

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-52.67
devel

DNE

feisty

DNE

gutsy

DNE

hardy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

released

2.6.20-17.36
gutsy

DNE

hardy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

DNE

gutsy

not-affected

hardy

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 6%
0.00027
Низкий

2.1 Low

CVSS2

Связанные уязвимости

redhat
около 18 лет назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

nvd
около 17 лет назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

debian
около 17 лет назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check ...

github
около 3 лет назад

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

oracle-oval
почти 17 лет назад

ELSA-2008-0612: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 6%
0.00027
Низкий

2.1 Low

CVSS2

Уязвимость CVE-2008-1294