Upstream information

CVE-2006-1524 at MITRE

Description

madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 3.6
Vector AV:L/AC:L/Au:N/C:P/I:P/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 165768 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE LINUX Retail Solution 8
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • k_athlon >= 2.4.21-309
  • k_debug >= 2.4.21-309
  • k_deflt >= 2.4.21-309
  • k_psmp >= 2.4.21-309
  • k_smp >= 2.4.21-309
  • kernel-source >= 2.4.21-309
Builds
SuSE Linux Enterprise Server 8 for IPF
UnitedLinux 1.0
  • k_deflt >= 2.4.21-309
  • k_itanium2 >= 2.4.21-309
  • k_itanium2-smp >= 2.4.21-309
  • k_page-64k >= 2.4.21-309
  • k_smp >= 2.4.21-309
  • kernel-source >= 2.4.21-309
Builds
SuSE Linux Enterprise Server 8 for AMD64
UnitedLinux 1.0
  • k_deflt >= 2.4.21-309
  • k_numa >= 2.4.21-309
  • k_smp >= 2.4.21-309
  • kernel-source >= 2.4.21-309
Builds
SUSE LINUX 10.0
  • Intel-536ep >= 4.69-14.5
  • kernel-bigsmp >= 2.6.13-15.10
  • kernel-bigsmp-nongpl >= 2.6.13-15.10
  • kernel-default >= 2.6.13-15.10
  • kernel-default-nongpl >= 2.6.13-15.10
  • kernel-iseries64 >= 2.6.13-15.10
  • kernel-ppc64 >= 2.6.13-15.10
  • kernel-smp >= 2.6.13-15.10
  • kernel-smp-nongpl >= 2.6.13-15.10
  • kernel-source >= 2.6.13-15.10
  • kernel-syms >= 2.6.13-15.10
  • kernel-um >= 2.6.13-15.10
  • kernel-um-nongpl >= 2.6.13-15.10
  • kernel-xen >= 2.6.13-15.10
  • kernel-xen-nongpl >= 2.6.13-15.10
  • um-host-kernel >= 2.6.13-15.10
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
  • kernel-iseries64 >= 2.4.21-309
  • kernel-ppc64 >= 2.4.21-309
  • kernel-source >= 2.4.21-309
Builds
SuSE Linux Enterprise Server 8 for IBM zSeries
  • k_deflt >= 2.4.21-309
  • kernel-source >= 2.4.21-309
Builds
Novell Linux Desktop 9 for x86_64
  • kernel-default >= 2.6.5-7.257
  • kernel-smp >= 2.6.5-7.257
  • kernel-source >= 2.6.5-7.257
  • kernel-syms >= 2.6.5-7.257
Builds
YOU Patch Nr: 10997
SUSE LINUX 9.3
  • Intel-536ep >= 4.69-10.6
  • kernel-bigsmp >= 2.6.11.4-21.12
  • kernel-bigsmp-nongpl >= 2.6.11.4-21.12
  • kernel-default >= 2.6.11.4-21.12
  • kernel-default-nongpl >= 2.6.11.4-21.12
  • kernel-docs >= 2.6.11.4-21.12
  • kernel-smp >= 2.6.11.4-21.12
  • kernel-smp-nongpl >= 2.6.11.4-21.12
  • kernel-source >= 2.6.11.4-21.12
  • kernel-syms >= 2.6.11.4-21.12
  • kernel-um >= 2.6.11.4-21.12
  • kernel-um-nongpl >= 2.6.11.4-21.12
  • kernel-xen >= 2.6.11.4-21.12
  • kernel-xen-nongpl >= 2.6.11.4-21.12
  • ltmodem >= 8.31a10-7.6
  • um-host-install-initrd >= 1.0-50.6
  • um-host-kernel >= 2.6.11.4-21.12
Novell Linux Desktop 9 for x86
  • kernel-bigsmp >= 2.6.5-7.257
  • kernel-default >= 2.6.5-7.257
  • kernel-smp >= 2.6.5-7.257
  • kernel-source >= 2.6.5-7.257
  • kernel-syms >= 2.6.5-7.257
Builds
YOU Patch Nr: 11001
Open Enterprise Server
  • kernel-bigsmp >= 2.6.5-7.257
  • kernel-debug >= 2.6.5-7.257
  • kernel-default >= 2.6.5-7.257
  • kernel-smp >= 2.6.5-7.257
  • kernel-source >= 2.6.5-7.257
  • kernel-syms >= 2.6.5-7.257
  • kernel-um >= 2.6.5-7.257
  • um-host-install-initrd >= 1.0-48.17
  • um-host-kernel >= 2.6.5-7.257
Builds
YOU Patch Nr: 11001
SuSE Linux Desktop 1.0
  • k_athlon >= 2.4.19-390
  • k_deflt >= 2.4.19-390
  • k_psmp >= 2.4.19-390
  • k_smp >= 2.4.19-390
  • kernel-source >= 2.4.19.SuSE-390
Builds