[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-1294Date: (C)2008-05-02   (M)2023-12-22


Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 2.1
Exploit Score: 3.9
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
BID-29004
SECUNIA-30018
SECUNIA-30769
SECUNIA-31341
DSA-1565
RHSA-2008:0612
USN-618-1
http://bugs.gentoo.org/show_bug.cgi?id=215000
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=9926e4c74300c4b31dee007298c6475d33369df0
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
linux-kernel-rlimitcpu-security-bypass(42145)
oval:org.mitre.oval:def:10974

CPE    141
cpe:/o:linux:linux_kernel:2.6.18
cpe:/o:linux:linux_kernel:2.6.17
cpe:/o:linux:linux_kernel:2.6.16
cpe:/o:linux:linux_kernel:2.6.16.37
...
CWE    1
CWE-20
OVAL    1
oval:org.mitre.oval:def:7816

© SecPod Technologies