Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-2148

Опубликовано: 12 мая 2008
Источник: ubuntu
Приоритет: low
CVSS2: 3.6

Описание

The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

feisty

DNE

gutsy

DNE

hardy

released

2.6.24-19.36
upstream

released

2.6.26~rc1

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

DNE

feisty

DNE

gutsy

DNE

hardy

DNE

upstream

released

2.6.26~rc1

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

not-affected

gutsy

DNE

hardy

DNE

upstream

released

2.6.26~rc1

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

DNE

gutsy

released

2.6.22-15.56
hardy

DNE

upstream

released

2.6.26~rc1

Показывать по

3.6 Low

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.

nvd
больше 17 лет назад

The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.

debian
больше 17 лет назад

The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and o ...

github
больше 3 лет назад

The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.

3.6 Low

CVSS2