New Search

Linux kernel 2.6.17 and other versions before 2.6.22 does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made which allows local users to bypass intended resource limits.

oval:org.mitre.oval:def:10974

Linux kernel 2.6.17 and other versions before 2.6.22 does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made which allows local users to bypass intended resource limits.

Family:
unix
Status:
ACCEPTED
Platform(s):
  • CentOS Linux 5
  • Oracle Linux 5
  • Red Hat Enterprise Linux 5
Class:
vulnerability
Reference(s):
  • CVE-2008-1294
Product(s):