First published: Fri May 19 2006(Updated: )
Certain modifications to the Linux kernel 2.6.16 and earlier do not add the appropriate Linux Security Modules (LSM) file_permission hooks to the (1) readv and (2) writev functions, which might allow attackers to bypass intended access restrictions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.0-test1 | |
Linux Kernel | =2.6.0-test10 | |
Linux Kernel | =2.6.0-test11 | |
Linux Kernel | =2.6.0-test2 | |
Linux Kernel | =2.6.0-test3 | |
Linux Kernel | =2.6.0-test4 | |
Linux Kernel | =2.6.0-test5 | |
Linux Kernel | =2.6.0-test6 | |
Linux Kernel | =2.6.0-test7 | |
Linux Kernel | =2.6.0-test8 | |
Linux Kernel | =2.6.0-test9 | |
Linux Kernel | =2.6.1 | |
Linux Kernel | =2.6.1-rc1 | |
Linux Kernel | =2.6.1-rc2 | |
Linux Kernel | =2.6.2 | |
Linux Kernel | =2.6.3 | |
Linux Kernel | =2.6.4 | |
Linux Kernel | =2.6.5 | |
Linux Kernel | =2.6.6 | |
Linux Kernel | =2.6.6-rc1 | |
Linux Kernel | =2.6.7 | |
Linux Kernel | =2.6.7-rc1 | |
Linux Kernel | =2.6.8 | |
Linux Kernel | =2.6.8-rc1 | |
Linux Kernel | =2.6.8-rc2 | |
Linux Kernel | =2.6.8-rc3 | |
Linux Kernel | =2.6.9-2.6.20 | |
Linux Kernel | =2.6.10 | |
Linux Kernel | =2.6.10-rc2 | |
Linux Kernel | =2.6.11 | |
Linux Kernel | =2.6.11-rc2 | |
Linux Kernel | =2.6.11-rc3 | |
Linux Kernel | =2.6.11-rc4 | |
Linux Kernel | =2.6.11.5 | |
Linux Kernel | =2.6.11.6 | |
Linux Kernel | =2.6.11.7 | |
Linux Kernel | =2.6.11.8 | |
Linux Kernel | =2.6.11.11 | |
Linux Kernel | =2.6.11.12 | |
Linux Kernel | =2.6.12-rc1 | |
Linux Kernel | =2.6.12-rc4 | |
Linux Kernel | =2.6.12-rc5 | |
Linux Kernel | =2.6.12.1 | |
Linux Kernel | =2.6.12.2 | |
Linux Kernel | =2.6.12.3 | |
Linux Kernel | =2.6.12.4 | |
Linux Kernel | =2.6.12.5 | |
Linux Kernel | =2.6.12.6 | |
Linux Kernel | =2.6.13 | |
Linux Kernel | =2.6.13-rc1 | |
Linux Kernel | =2.6.13-rc4 | |
Linux Kernel | =2.6.13-rc6 | |
Linux Kernel | =2.6.13-rc7 | |
Linux Kernel | =2.6.13.1 | |
Linux Kernel | =2.6.13.2 | |
Linux Kernel | =2.6.13.3 | |
Linux Kernel | =2.6.13.4 | |
Linux Kernel | =2.6.14 | |
Linux Kernel | =2.6.14-rc1 | |
Linux Kernel | =2.6.14-rc2 | |
Linux Kernel | =2.6.14-rc3 | |
Linux Kernel | =2.6.14-rc4 | |
Linux Kernel | =2.6.14.1 | |
Linux Kernel | =2.6.14.2 | |
Linux Kernel | =2.6.14.3 | |
Linux Kernel | =2.6.14.4 | |
Linux Kernel | =2.6.14.5 | |
Linux Kernel | =2.6.15 | |
Linux Kernel | =2.6.15-rc1 | |
Linux Kernel | =2.6.15-rc3 | |
Linux Kernel | =2.6.15.1 | |
Linux Kernel | =2.6.15.2 | |
Linux Kernel | =2.6.15.3 | |
Linux Kernel | =2.6.15.4 | |
Linux Kernel | =2.6.15.5 | |
Linux Kernel | =2.6.16 | |
Linux Kernel | =2.6_test9_cvs |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1856 is classified as a moderate severity vulnerability due to its potential to allow attackers to bypass access restrictions.
To fix CVE-2006-1856, you should upgrade to a newer version of the Linux kernel that includes the appropriate Linux Security Modules file_permission hooks.
CVE-2006-1856 impacts the Linux kernel versions 2.6.0 through 2.6.16, including various release candidates and test versions.
CVE-2006-1856 can be exploited by attackers to read or write files without proper authorization through the readv and writev functions.
CVE-2006-1856 is not classified as a zero-day vulnerability as it was publicly disclosed in 2006.