summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2008-1294
blob: 884b1fac0c8ff16bf4d4dd65f6fea4ae7fd33f50 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Candidate: CVE-2008-1294
Description: 
 Linux kernel 2.6.17, and other versions before 2.6.22, does not check
 when a user attempts to set RLIMIT_CPU to 0 until after the change is
 made, which allows local users to bypass intended resource limits.
References: 
Ubuntu-Description: 
 It was discovered that CPU resource limits could be bypassed.
 A malicious local user could exploit this to avoid administratively
 imposed resource limits.
Notes: 
 https://launchpad.net/bugs/107209
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419706
 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9926e4c74300c4b31dee007298c6475d33369df0
 kees> for pre-2.6.17 kernels, two additional commits are needed:
 kees>  ec9e16bacdba1da1ee15dd162384e22df5c87e09
 kees>  e0661111e5441995f7a69dc4336c9f131cb9bc58
Bugs: 
upstream: 
linux-2.6: 
2.6.18-etch-security: released (2.6.18.dfsg.1-18etch2) [bugfix/RLIMIT_CPU-earlier-checking.patch]
2.6.24-etch-security: N/A
2.6.15-dapper-security: released (2.6.15-52.67)
2.6.17-edgy-security: ignored (EOL)
2.6.20-feisty-security: released (2.6.20-17.36)
2.6.22-gutsy-security: N/A
2.6.24-hardy-security: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy