Upstream information

CVE-2008-1294 at MITRE

Description

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 2.1
Vector AV:L/AC:L/Au:N/C:N/I:N/A:P
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 370198 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise SDK 10 SP2
  • kernel-debug >= 2.6.16.60-0.37_f594963d
  • kernel-kdump >= 2.6.16.60-0.37_f594963d
  • kernel-xen >= 2.6.16.60-0.37_f594963d
sle10-sp2-sdk.x86-64
sles10-sp2-debuginfo.x86-64
sles10-sp2.x86-64
sled10-sp2.x86-64
ZYPP Patch Nr: 6113
SUSE Linux Enterprise SDK 10 SP2
  • kernel-kdump >= 2.6.16.60-0.37_f594963d
sle10-sp2-sdk.ppc
sles10-sp2-debuginfo.ppc
sles10-sp2.ppc
ZYPP Patch Nr: 6111
SUSE Linux Enterprise SDK 10 SP2
  • kernel-debug >= 2.6.16.60-0.37_f594963d
sle10-sp2-sdk.ia64
sles10-sp2.ia64
sles10-sp2-debuginfo.ia64
ZYPP Patch Nr: 6110
SUSE Linux Enterprise SDK 10 SP2
  • kernel-debug >= 2.6.16.60-0.37_f594963d
  • kernel-kdump >= 2.6.16.60-0.37_f594963d
  • kernel-xen >= 2.6.16.60-0.37_f594963d
  • kernel-xenpae >= 2.6.16.60-0.37_f594963d
sles10-sp2.x86
sled10-sp2.x86
sle10-sp2-sdk.x86
sles10-sp2-debuginfo.x86
ZYPP Patch Nr: 6109