Vulnerability Description
FreeBSD kernel 5.4-STABLE and 6.0 does not completely initialize a buffer before making it available to userland, which could allow local users to read portions of kernel memory.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 5.4 |
References
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:06.kmem.asc
- http://secunia.com/advisories/18599PatchVendor Advisory
- http://securitytracker.com/id?1015541
- http://www.osvdb.org/22730
- http://www.securityfocus.com/bid/16373
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24338
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:06.kmem.asc
- http://secunia.com/advisories/18599PatchVendor Advisory
- http://securitytracker.com/id?1015541
- http://www.osvdb.org/22730
- http://www.securityfocus.com/bid/16373
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24338
FAQ
What is CVE-2006-0379?
CVE-2006-0379 is a vulnerability with a CVSS score of 2.1 (LOW). FreeBSD kernel 5.4-STABLE and 6.0 does not completely initialize a buffer before making it available to userland, which could allow local users to read portions of kernel memory.
How severe is CVE-2006-0379?
CVE-2006-0379 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0379?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.