First published: Wed Apr 19 2006(Updated: )
madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.16 | |
Linux Kernel | =2.6.16.1 | |
Linux Kernel | =2.6.16.2 | |
Linux Kernel | =2.6.16.3 | |
Linux Kernel | =2.6.16.4 | |
Linux Kernel | =2.6.16.5 | |
Linux Kernel | =2.6.16.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1524 has a medium severity rating due to its potential to allow local users to bypass IPC permissions.
To address CVE-2006-1524, upgrading to a patched version of the Linux kernel beyond 2.6.16.6 is recommended.
CVE-2006-1524 affects Linux kernel versions 2.6.16 through 2.6.16.6 inclusive.
CVE-2006-1524 is a local privilege escalation vulnerability that allows modifications to read-only tmpfs files.
Local users on systems running the affected versions of the Linux kernel are impacted by CVE-2006-1524.