First published: Mon May 12 2008(Updated: )
The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =2.6.22.15 | |
Linux Linux kernel | =2.6.22.4 | |
Linux Linux kernel | =2.6.22.21 | |
Linux Linux kernel | =2.6.22.12 | |
Linux Linux kernel | =2.6.22.1 | |
Linux Linux kernel | =2.6.22 | |
Linux Linux kernel | =2.6.22.7 | |
Linux Linux kernel | =2.6.22.18 | |
Linux Linux kernel | =2.6.22.20 | |
Linux Linux kernel | =2.6.22.6 | |
Linux Linux kernel | =2.6.22.3 | |
Linux Linux kernel | =2.6.22.9 | |
Linux Linux kernel | =2.6.22.13 | |
Linux Linux kernel | =2.6.22.17 | |
Linux Linux kernel | =2.6.22.11 | |
Linux Linux kernel | =2.6.22.10 | |
Linux Linux kernel | =2.6.22.8 | |
Linux Linux kernel | =2.6.22.2 | |
Linux Linux kernel | =2.6.22.19 | |
Linux Linux kernel | =2.6.22.5 | |
Linux Linux kernel | =2.6.22.16 | |
Linux Linux kernel | =2.6.22.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.