CVE-2006-0379

FreeBSD kernel 5.4-STABLE and 6.0 does not completely initialize a buffer before making it available to userland, which could allow local users to read portions of kernel memory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*

History

21 Nov 2024, 00:06

Type Values Removed Values Added
References () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:06.kmem.asc - () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:06.kmem.asc -
References () http://secunia.com/advisories/18599 - Patch, Vendor Advisory () http://secunia.com/advisories/18599 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1015541 - () http://securitytracker.com/id?1015541 -
References () http://www.osvdb.org/22730 - () http://www.osvdb.org/22730 -
References () http://www.securityfocus.com/bid/16373 - () http://www.securityfocus.com/bid/16373 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24338 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24338 -

Information

Published : 2006-01-25 22:03

Updated : 2024-11-21 00:06


NVD link : CVE-2006-0379

Mitre link : CVE-2006-0379

CVE.ORG link : CVE-2006-0379


JSON object : View

Products Affected

freebsd

  • freebsd