CVE-2006-1524
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
19/04/2006
Last modified:
03/04/2025
Description
madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071.
Impact
Base Score 2.0
3.60
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6
- http://lwn.net/Alerts/180820/
- http://secunia.com/advisories/19657
- http://secunia.com/advisories/19664
- http://secunia.com/advisories/19735
- http://secunia.com/advisories/20398
- http://secunia.com/advisories/20671
- http://secunia.com/advisories/20914
- http://www.debian.org/security/2006/dsa-1097
- http://www.debian.org/security/2006/dsa-1103
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.osvdb.org/24714
- http://www.securityfocus.com/bid/17587
- http://www.vupen.com/english/advisories/2006/1391
- http://www.vupen.com/english/advisories/2006/1475
- http://www.vupen.com/english/advisories/2006/2554
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25870
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6
- http://lwn.net/Alerts/180820/
- http://secunia.com/advisories/19657
- http://secunia.com/advisories/19664
- http://secunia.com/advisories/19735
- http://secunia.com/advisories/20398
- http://secunia.com/advisories/20671
- http://secunia.com/advisories/20914
- http://www.debian.org/security/2006/dsa-1097
- http://www.debian.org/security/2006/dsa-1103
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.osvdb.org/24714
- http://www.securityfocus.com/bid/17587
- http://www.vupen.com/english/advisories/2006/1391
- http://www.vupen.com/english/advisories/2006/1475
- http://www.vupen.com/english/advisories/2006/2554
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25870



