blob: 5f190932c1596361abfe96f9391c0e90374b8ad9 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
|
Candidate: CVE-2006-2071
References:
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b78b6af66a5fbaf17d7e6bfc32384df5e34408c8
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190073
Description:
Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC
permissions and modify a readonly attachment of shared memory by using
mprotect to give write permission to the attachment. NOTE: some original raw
sources combined this issue with CVE-2006-1524, but they are different bugs.
Notes:
Bugs:
upstream: released (2.6.16.6)
linux-2.6.16: released (2.6.16-8)
linux-2.6: released (2.6.16-8)
2.6.8-sarge-security: released (2.6.8-16sarge3)
2.4.27-sarge-security: released (2.4.27-10sarge3)
|