Vulnerability Description
Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.16 |
References
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.5
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047907.html
- http://secunia.com/advisories/21041
- http://secunia.com/advisories/21057
- http://secunia.com/advisories/21073
- http://secunia.com/advisories/21119
- http://secunia.com/advisories/21123
- http://secunia.com/advisories/21179
- http://secunia.com/advisories/21498
- http://secunia.com/advisories/21605
- http://secunia.com/advisories/22174
- http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm
- http://www.debian.org/security/2006/dsa-1111
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=blobdif
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:124
FAQ
What is CVE-2006-3626?
CVE-2006-3626 is a vulnerability with a CVSS score of 6.2 (MEDIUM). Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
How severe is CVE-2006-3626?
CVE-2006-3626 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3626?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.