Vulnerability Description
madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.16 |
Related Weaknesses (CWE)
References
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6
- http://lwn.net/Alerts/180820/
- http://secunia.com/advisories/19657PatchVendor Advisory
- http://secunia.com/advisories/19664Vendor Advisory
- http://secunia.com/advisories/19735Vendor Advisory
- http://secunia.com/advisories/20398Vendor Advisory
- http://secunia.com/advisories/20671Vendor Advisory
- http://secunia.com/advisories/20914Vendor Advisory
- http://www.debian.org/security/2006/dsa-1097
- http://www.debian.org/security/2006/dsa-1103
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.osvdb.org/24714
- http://www.securityfocus.com/bid/17587Patch
- http://www.vupen.com/english/advisories/2006/1391Vendor Advisory
- http://www.vupen.com/english/advisories/2006/1475Vendor Advisory
FAQ
What is CVE-2006-1524?
CVE-2006-1524 is a vulnerability with a CVSS score of 3.6 (LOW). madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with ze...
How severe is CVE-2006-1524?
CVE-2006-1524 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1524?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.