First published: Fri Jul 07 2006(Updated: )
The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.13 | |
Linux Kernel | =2.6.13.1 | |
Linux Kernel | =2.6.13.2 | |
Linux Kernel | =2.6.13.3 | |
Linux Kernel | =2.6.13.4 | |
Linux Kernel | =2.6.13.5 | |
Linux Kernel | =2.6.14 | |
Linux Kernel | =2.6.14-rc1 | |
Linux Kernel | =2.6.14-rc2 | |
Linux Kernel | =2.6.14-rc3 | |
Linux Kernel | =2.6.14-rc4 | |
Linux Kernel | =2.6.14-rc5 | |
Linux Kernel | =2.6.14.1 | |
Linux Kernel | =2.6.14.2 | |
Linux Kernel | =2.6.14.3 | |
Linux Kernel | =2.6.14.4 | |
Linux Kernel | =2.6.14.5 | |
Linux Kernel | =2.6.14.6 | |
Linux Kernel | =2.6.14.7 | |
Linux Kernel | =2.6.15 | |
Linux Kernel | =2.6.15-rc1 | |
Linux Kernel | =2.6.15-rc2 | |
Linux Kernel | =2.6.15-rc3 | |
Linux Kernel | =2.6.15-rc4 | |
Linux Kernel | =2.6.15-rc5 | |
Linux Kernel | =2.6.15-rc6 | |
Linux Kernel | =2.6.15-rc7 | |
Linux Kernel | =2.6.15.1 | |
Linux Kernel | =2.6.15.2 | |
Linux Kernel | =2.6.15.3 | |
Linux Kernel | =2.6.15.4 | |
Linux Kernel | =2.6.15.5 | |
Linux Kernel | =2.6.15.6 | |
Linux Kernel | =2.6.15.7 | |
Linux Kernel | =2.6.16 | |
Linux Kernel | =2.6.16-rc1 | |
Linux Kernel | =2.6.16-rc2 | |
Linux Kernel | =2.6.16-rc3 | |
Linux Kernel | =2.6.16-rc4 | |
Linux Kernel | =2.6.16-rc5 | |
Linux Kernel | =2.6.16-rc6 | |
Linux Kernel | =2.6.16.1 | |
Linux Kernel | =2.6.16.2 | |
Linux Kernel | =2.6.16.3 | |
Linux Kernel | =2.6.16.4 | |
Linux Kernel | =2.6.16.5 | |
Linux Kernel | =2.6.16.6 | |
Linux Kernel | =2.6.16.7 | |
Linux Kernel | =2.6.16.8 | |
Linux Kernel | =2.6.16.9 | |
Linux Kernel | =2.6.16.10 | |
Linux Kernel | =2.6.16.11 | |
Linux Kernel | =2.6.16.12 | |
Linux Kernel | =2.6.16.13 | |
Linux Kernel | =2.6.16.14 | |
Linux Kernel | =2.6.16.15 | |
Linux Kernel | =2.6.16.16 | |
Linux Kernel | =2.6.16.17 | |
Linux Kernel | =2.6.16.18 | |
Linux Kernel | =2.6.16.19 | |
Linux Kernel | =2.6.16.20 | |
Linux Kernel | =2.6.16.21 | |
Linux Kernel | =2.6.16.22 | |
Linux Kernel | =2.6.16.23 | |
Linux Kernel | =2.6.17 | |
Linux Kernel | =2.6.17-rc1 | |
Linux Kernel | =2.6.17-rc2 | |
Linux Kernel | =2.6.17-rc3 | |
Linux Kernel | =2.6.17-rc4 | |
Linux Kernel | =2.6.17-rc5 | |
Linux Kernel | =2.6.17-rc6 | |
Linux Kernel | =2.6.17.1 | |
Linux Kernel | =2.6.17.2 | |
Linux Kernel | =2.6.17.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2451 is classified as a moderate severity vulnerability due to its potential to cause a denial of service.
To resolve CVE-2006-2451, upgrade the Linux kernel to version 2.6.17.4 or later.
CVE-2006-2451 affects Linux kernel versions from 2.6.13 up to but not including 2.6.17.4.
Yes, CVE-2006-2451 could potentially allow local users to gain elevated privileges.
CVE-2006-2451 can lead to disk consumption, which may degrade system performance and stability.