madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 - | |
References | () http://lwn.net/Alerts/180820/ - | |
References | () http://secunia.com/advisories/19657 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/19664 - Vendor Advisory | |
References | () http://secunia.com/advisories/19735 - Vendor Advisory | |
References | () http://secunia.com/advisories/20398 - Vendor Advisory | |
References | () http://secunia.com/advisories/20671 - Vendor Advisory | |
References | () http://secunia.com/advisories/20914 - Vendor Advisory | |
References | () http://www.debian.org/security/2006/dsa-1097 - | |
References | () http://www.debian.org/security/2006/dsa-1103 - | |
References | () http://www.novell.com/linux/security/advisories/2006-05-31.html - | |
References | () http://www.osvdb.org/24714 - | |
References | () http://www.securityfocus.com/bid/17587 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/1391 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/1475 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/2554 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25870 - |
Information
Published : 2006-04-19 18:18
Updated : 2024-11-21 00:09
NVD link : CVE-2006-1524
Mitre link : CVE-2006-1524
CVE.ORG link : CVE-2006-1524
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-264
Permissions, Privileges, and Access Controls