LOW · 3.6

CVE-2006-1524

madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with ze...

Vulnerability Description

madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071.

CVSS Score

3.6

LOW

AV:L/AC:L/Au:N/C:P/I:P/A:N
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
LinuxLinux Kernel2.6.16

Related Weaknesses (CWE)

References

FAQ

What is CVE-2006-1524?

CVE-2006-1524 is a vulnerability with a CVSS score of 3.6 (LOW). madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with ze...

How severe is CVE-2006-1524?

CVE-2006-1524 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2006-1524?

Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.