CVE-2006-1524
Published Apr 19, 2006
Last updated 7 years ago
Overview
- Description
- madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.6
- Impact score
- 4.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34E60197-56C3-485C-9609-B1C4A0E0FCB2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86E452E4-45A9-4469-BF69-F40B6598F0EA" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5751AC4-A60F-42C6-88E5-FC8CFEE6F696" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48777A01-8F36-4752-8F7A-1D1686C69A33" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42DA6A18-5AA1-4920-94C6-8D0BB73C5352" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31" } ], "operator": "OR" } ] } ]