Package: linux-2.6 Version: 2.6.22-1 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6.
CVE-2008-2148[0]: | The utimensat system call in Linux kernel 2.6.22 and other versions | before 2.6.25.3 does not check file permissions when certain UTIME_NOW | and UTIME_OMIT combinations are used, which allows local users to | modify file times of arbitrary files, possibly leading to a denial of | service. Upstream patch: http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=f9dfda1ad0637a89a64d001cf81478bd8d9b6306 Stable is not affected by this. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2148 http://security-tracker.debian.net/tracker/CVE-2008-2148 -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgp05JUQyrSDx.pgp
Description: PGP signature