Security restrictions bypass in Linux kernel - CVE-2006-1524
Published: April 19, 2006 / Updated: July 20, 2017
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to read and manipulate data.
madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined 2 separate issues. The mprotect issue now has a separate name, CVE-2006-2071.
How to mitigate CVE-2006-1524
Sources
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6
- http://lwn.net/Alerts/180820/
- http://secunia.com/advisories/19657
- http://secunia.com/advisories/19664
- http://secunia.com/advisories/19735
- http://secunia.com/advisories/20398
- http://secunia.com/advisories/20671
- http://secunia.com/advisories/20914
- http://www.debian.org/security/2006/dsa-1097
- http://www.debian.org/security/2006/dsa-1103
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.osvdb.org/24714
- http://www.securityfocus.com/bid/17587
- http://www.vupen.com/english/advisories/2006/1391
- http://www.vupen.com/english/advisories/2006/1475
- http://www.vupen.com/english/advisories/2006/2554
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25870