Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1565-1 | New Linux 2.6.18 packages fix several vulnerabilities |
EUVD |
EUVD-2008-1301 | Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits. |
Ubuntu USN |
USN-618-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T08:17:34.267Z
Reserved: 2008-03-12T00:00:00
Link: CVE-2008-1294
No data.
Status : Deferred
Published: 2008-05-02T16:05:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-1294
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN