CVE-2006-1524

madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071.
References
Link Resource
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6
http://lwn.net/Alerts/180820/
http://secunia.com/advisories/19657 Patch Vendor Advisory
http://secunia.com/advisories/19664 Vendor Advisory
http://secunia.com/advisories/19735 Vendor Advisory
http://secunia.com/advisories/20398 Vendor Advisory
http://secunia.com/advisories/20671 Vendor Advisory
http://secunia.com/advisories/20914 Vendor Advisory
http://www.debian.org/security/2006/dsa-1097
http://www.debian.org/security/2006/dsa-1103
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.osvdb.org/24714
http://www.securityfocus.com/bid/17587 Patch
http://www.vupen.com/english/advisories/2006/1391 Vendor Advisory
http://www.vupen.com/english/advisories/2006/1475 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2554 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/25870
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6
http://lwn.net/Alerts/180820/
http://secunia.com/advisories/19657 Patch Vendor Advisory
http://secunia.com/advisories/19664 Vendor Advisory
http://secunia.com/advisories/19735 Vendor Advisory
http://secunia.com/advisories/20398 Vendor Advisory
http://secunia.com/advisories/20671 Vendor Advisory
http://secunia.com/advisories/20914 Vendor Advisory
http://www.debian.org/security/2006/dsa-1097
http://www.debian.org/security/2006/dsa-1103
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.osvdb.org/24714
http://www.securityfocus.com/bid/17587 Patch
http://www.vupen.com/english/advisories/2006/1391 Vendor Advisory
http://www.vupen.com/english/advisories/2006/1475 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2554 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/25870
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:09

Type Values Removed Values Added
References () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 - () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 -
References () http://lwn.net/Alerts/180820/ - () http://lwn.net/Alerts/180820/ -
References () http://secunia.com/advisories/19657 - Patch, Vendor Advisory () http://secunia.com/advisories/19657 - Patch, Vendor Advisory
References () http://secunia.com/advisories/19664 - Vendor Advisory () http://secunia.com/advisories/19664 - Vendor Advisory
References () http://secunia.com/advisories/19735 - Vendor Advisory () http://secunia.com/advisories/19735 - Vendor Advisory
References () http://secunia.com/advisories/20398 - Vendor Advisory () http://secunia.com/advisories/20398 - Vendor Advisory
References () http://secunia.com/advisories/20671 - Vendor Advisory () http://secunia.com/advisories/20671 - Vendor Advisory
References () http://secunia.com/advisories/20914 - Vendor Advisory () http://secunia.com/advisories/20914 - Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1097 - () http://www.debian.org/security/2006/dsa-1097 -
References () http://www.debian.org/security/2006/dsa-1103 - () http://www.debian.org/security/2006/dsa-1103 -
References () http://www.novell.com/linux/security/advisories/2006-05-31.html - () http://www.novell.com/linux/security/advisories/2006-05-31.html -
References () http://www.osvdb.org/24714 - () http://www.osvdb.org/24714 -
References () http://www.securityfocus.com/bid/17587 - Patch () http://www.securityfocus.com/bid/17587 - Patch
References () http://www.vupen.com/english/advisories/2006/1391 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/1391 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/1475 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/1475 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/2554 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2554 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25870 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25870 -

Information

Published : 2006-04-19 18:18

Updated : 2024-11-21 00:09


NVD link : CVE-2006-1524

Mitre link : CVE-2006-1524

CVE.ORG link : CVE-2006-1524


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-264

Permissions, Privileges, and Access Controls