Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-2148

Опубликовано: 08 апр. 2008
Источник: redhat
EPSS Низкий

Описание

The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=455275kernel: fix permission checking in sys_utimensat

EPSS

Процентиль: 21%
0.00065
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.

nvd
больше 17 лет назад

The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.

debian
больше 17 лет назад

The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and o ...

github
больше 3 лет назад

The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.

EPSS

Процентиль: 21%
0.00065
Низкий