CVE-2008-2148
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
12/05/2008
Last modified:
09/04/2025
Description
The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.
Impact
Base Score 2.0
3.60
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba%3Dcommit%3Bh%3Df9dfda1ad0637a89a64d001cf81478bd8d9b6306
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
- http://secunia.com/advisories/30198
- http://secunia.com/advisories/30241
- http://secunia.com/advisories/30818
- http://secunia.com/advisories/31107
- http://secunia.com/advisories/31628
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0169
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A167
- http://www.redhat.com/support/errata/RHSA-2008-0585.html
- http://www.securityfocus.com/bid/29134
- http://www.ubuntu.com/usn/usn-625-1
- http://www.vupen.com/english/advisories/2008/1543/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42342
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba%3Dcommit%3Bh%3Df9dfda1ad0637a89a64d001cf81478bd8d9b6306
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
- http://secunia.com/advisories/30198
- http://secunia.com/advisories/30241
- http://secunia.com/advisories/30818
- http://secunia.com/advisories/31107
- http://secunia.com/advisories/31628
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0169
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A167
- http://www.redhat.com/support/errata/RHSA-2008-0585.html
- http://www.securityfocus.com/bid/29134
- http://www.ubuntu.com/usn/usn-625-1
- http://www.vupen.com/english/advisories/2008/1543/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42342



