Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2006-1524


madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071.


Published

2006-04-19T18:18:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 3.6 (LOW)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:P/A:N

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

3.9

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-264

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel 2.6.16 Yes
Operating System linux linux_kernel 2.6.16.1 Yes
Operating System linux linux_kernel 2.6.16.2 Yes
Operating System linux linux_kernel 2.6.16.3 Yes
Operating System linux linux_kernel 2.6.16.4 Yes
Operating System linux linux_kernel 2.6.16.5 Yes
Operating System linux linux_kernel 2.6.16.6 Yes

References