Lucene search

K
nvd[email protected]NVD:CVE-2008-1294
HistoryMay 02, 2008 - 4:05 p.m.

CVE-2008-1294

2008-05-0216:05:00
CWE-399
CWE-20
web.nvd.nist.gov
6

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

AI Score

7.2

Confidence

High

EPSS

0

Percentile

5.1%

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

Affected configurations

Nvd
Node
linuxlinux_kernelRange2.6.21rc7
OR
linuxlinux_kernelMatch2.6.2
OR
linuxlinux_kernelMatch2.6.2rc1
OR
linuxlinux_kernelMatch2.6.2rc2
OR
linuxlinux_kernelMatch2.6.2rc3
OR
linuxlinux_kernelMatch2.6.16
OR
linuxlinux_kernelMatch2.6.16rc1
OR
linuxlinux_kernelMatch2.6.16rc2
OR
linuxlinux_kernelMatch2.6.16rc3
OR
linuxlinux_kernelMatch2.6.16rc4
OR
linuxlinux_kernelMatch2.6.16rc5
OR
linuxlinux_kernelMatch2.6.16rc6
OR
linuxlinux_kernelMatch2.6.16.1
OR
linuxlinux_kernelMatch2.6.16.2
OR
linuxlinux_kernelMatch2.6.16.3
OR
linuxlinux_kernelMatch2.6.16.4
OR
linuxlinux_kernelMatch2.6.16.5
OR
linuxlinux_kernelMatch2.6.16.6
OR
linuxlinux_kernelMatch2.6.16.7
OR
linuxlinux_kernelMatch2.6.16.8
OR
linuxlinux_kernelMatch2.6.16.9
OR
linuxlinux_kernelMatch2.6.16.10
OR
linuxlinux_kernelMatch2.6.16.11
OR
linuxlinux_kernelMatch2.6.16.12
OR
linuxlinux_kernelMatch2.6.16.13
OR
linuxlinux_kernelMatch2.6.16.14
OR
linuxlinux_kernelMatch2.6.16.15
OR
linuxlinux_kernelMatch2.6.16.16
OR
linuxlinux_kernelMatch2.6.16.17
OR
linuxlinux_kernelMatch2.6.16.18
OR
linuxlinux_kernelMatch2.6.16.19
OR
linuxlinux_kernelMatch2.6.16.20
OR
linuxlinux_kernelMatch2.6.16.21
OR
linuxlinux_kernelMatch2.6.16.22
OR
linuxlinux_kernelMatch2.6.16.23
OR
linuxlinux_kernelMatch2.6.16.24
OR
linuxlinux_kernelMatch2.6.16.25
OR
linuxlinux_kernelMatch2.6.16.26
OR
linuxlinux_kernelMatch2.6.16.27
OR
linuxlinux_kernelMatch2.6.16.28
OR
linuxlinux_kernelMatch2.6.16.29
OR
linuxlinux_kernelMatch2.6.16.30
OR
linuxlinux_kernelMatch2.6.16.31
OR
linuxlinux_kernelMatch2.6.16.32
OR
linuxlinux_kernelMatch2.6.16.33
OR
linuxlinux_kernelMatch2.6.16.34
OR
linuxlinux_kernelMatch2.6.16.35
OR
linuxlinux_kernelMatch2.6.16.36
OR
linuxlinux_kernelMatch2.6.16.37
OR
linuxlinux_kernelMatch2.6.16.38
OR
linuxlinux_kernelMatch2.6.16.39
OR
linuxlinux_kernelMatch2.6.16.40
OR
linuxlinux_kernelMatch2.6.16.41
OR
linuxlinux_kernelMatch2.6.16.43
OR
linuxlinux_kernelMatch2.6.16.44
OR
linuxlinux_kernelMatch2.6.16.45
OR
linuxlinux_kernelMatch2.6.16.46
OR
linuxlinux_kernelMatch2.6.16.47
OR
linuxlinux_kernelMatch2.6.16.48
OR
linuxlinux_kernelMatch2.6.16.49
OR
linuxlinux_kernelMatch2.6.16.50
OR
linuxlinux_kernelMatch2.6.16.51
OR
linuxlinux_kernelMatch2.6.16.52
OR
linuxlinux_kernelMatch2.6.16.53
OR
linuxlinux_kernelMatch2.6.16_rc7
OR
linuxlinux_kernelMatch2.6.17
OR
linuxlinux_kernelMatch2.6.17rc1
OR
linuxlinux_kernelMatch2.6.17rc2
OR
linuxlinux_kernelMatch2.6.17rc3
OR
linuxlinux_kernelMatch2.6.17rc4
OR
linuxlinux_kernelMatch2.6.17rc5
OR
linuxlinux_kernelMatch2.6.17rc6
OR
linuxlinux_kernelMatch2.6.17.1
OR
linuxlinux_kernelMatch2.6.17.2
OR
linuxlinux_kernelMatch2.6.17.3
OR
linuxlinux_kernelMatch2.6.17.4
OR
linuxlinux_kernelMatch2.6.17.5
OR
linuxlinux_kernelMatch2.6.17.6
OR
linuxlinux_kernelMatch2.6.17.7
OR
linuxlinux_kernelMatch2.6.17.8
OR
linuxlinux_kernelMatch2.6.17.9
OR
linuxlinux_kernelMatch2.6.17.10
OR
linuxlinux_kernelMatch2.6.17.11
OR
linuxlinux_kernelMatch2.6.17.12
OR
linuxlinux_kernelMatch2.6.17.13
OR
linuxlinux_kernelMatch2.6.17.14
OR
linuxlinux_kernelMatch2.6.18
OR
linuxlinux_kernelMatch2.6.18rc1
OR
linuxlinux_kernelMatch2.6.18rc2
OR
linuxlinux_kernelMatch2.6.18rc3
OR
linuxlinux_kernelMatch2.6.18rc4
OR
linuxlinux_kernelMatch2.6.18rc5
OR
linuxlinux_kernelMatch2.6.18rc6
OR
linuxlinux_kernelMatch2.6.18rc7
OR
linuxlinux_kernelMatch2.6.18.1
OR
linuxlinux_kernelMatch2.6.18.2
OR
linuxlinux_kernelMatch2.6.18.3
OR
linuxlinux_kernelMatch2.6.18.4
OR
linuxlinux_kernelMatch2.6.18.5
OR
linuxlinux_kernelMatch2.6.18.6
OR
linuxlinux_kernelMatch2.6.18.7
OR
linuxlinux_kernelMatch2.6.18.8
OR
linuxlinux_kernelMatch2.6.19
OR
linuxlinux_kernelMatch2.6.19rc1
OR
linuxlinux_kernelMatch2.6.19rc2
OR
linuxlinux_kernelMatch2.6.19rc3
OR
linuxlinux_kernelMatch2.6.19rc4
OR
linuxlinux_kernelMatch2.6.19.1
OR
linuxlinux_kernelMatch2.6.19.2
OR
linuxlinux_kernelMatch2.6.19.3
OR
linuxlinux_kernelMatch2.6.20
OR
linuxlinux_kernelMatch2.6.20rc2
OR
linuxlinux_kernelMatch2.6.20.1
OR
linuxlinux_kernelMatch2.6.20.2
OR
linuxlinux_kernelMatch2.6.20.3
OR
linuxlinux_kernelMatch2.6.20.4
OR
linuxlinux_kernelMatch2.6.20.5
OR
linuxlinux_kernelMatch2.6.20.6
OR
linuxlinux_kernelMatch2.6.20.7
OR
linuxlinux_kernelMatch2.6.20.8
OR
linuxlinux_kernelMatch2.6.20.9
OR
linuxlinux_kernelMatch2.6.20.10
OR
linuxlinux_kernelMatch2.6.20.11
OR
linuxlinux_kernelMatch2.6.20.12
OR
linuxlinux_kernelMatch2.6.20.13
OR
linuxlinux_kernelMatch2.6.20.14
OR
linuxlinux_kernelMatch2.6.20.15
OR
linuxlinux_kernelMatch2.6.21
OR
linuxlinux_kernelMatch2.6.21git1
OR
linuxlinux_kernelMatch2.6.21git2
OR
linuxlinux_kernelMatch2.6.21git3
OR
linuxlinux_kernelMatch2.6.21git4
OR
linuxlinux_kernelMatch2.6.21git5
OR
linuxlinux_kernelMatch2.6.21git6
OR
linuxlinux_kernelMatch2.6.21git7
OR
linuxlinux_kernelMatch2.6.21rc3
OR
linuxlinux_kernelMatch2.6.21rc4
OR
linuxlinux_kernelMatch2.6.21rc5
OR
linuxlinux_kernelMatch2.6.21rc6
OR
linuxlinux_kernelMatch2.6.21.1
OR
linuxlinux_kernelMatch2.6.21.2
OR
linuxlinux_kernelMatch2.6.21.3
OR
linuxlinux_kernelMatch2.6.21.4

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

AI Score

7.2

Confidence

High

EPSS

0

Percentile

5.1%