Lucene search

K
cve[email protected]CVE-2006-4813
HistoryOct 12, 2006 - 8:07 p.m.

CVE-2006-4813

2006-10-1220:07:00
web.nvd.nist.gov
31
cve-2006-4813
linux kernel
buffer.c
security vulnerability
nvd

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.1%

The __block_prepare_write function in fs/buffer.c for Linux kernel 2.6.x before 2.6.13 does not properly clear buffers during certain error conditions, which allows local users to read portions of files that have been unlinked.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.6.0
OR
linuxlinux_kernelMatch2.6.0test1
OR
linuxlinux_kernelMatch2.6.0test10
OR
linuxlinux_kernelMatch2.6.0test11
OR
linuxlinux_kernelMatch2.6.0test2
OR
linuxlinux_kernelMatch2.6.0test3
OR
linuxlinux_kernelMatch2.6.0test4
OR
linuxlinux_kernelMatch2.6.0test5
OR
linuxlinux_kernelMatch2.6.0test6
OR
linuxlinux_kernelMatch2.6.0test7
OR
linuxlinux_kernelMatch2.6.0test8
OR
linuxlinux_kernelMatch2.6.0test9
OR
linuxlinux_kernelMatch2.6.1
OR
linuxlinux_kernelMatch2.6.1rc1
OR
linuxlinux_kernelMatch2.6.1rc2
OR
linuxlinux_kernelMatch2.6.1rc3
OR
linuxlinux_kernelMatch2.6.2
OR
linuxlinux_kernelMatch2.6.2rc1
OR
linuxlinux_kernelMatch2.6.2rc2
OR
linuxlinux_kernelMatch2.6.2rc3
OR
linuxlinux_kernelMatch2.6.3
OR
linuxlinux_kernelMatch2.6.3rc1
OR
linuxlinux_kernelMatch2.6.3rc2
OR
linuxlinux_kernelMatch2.6.3rc3
OR
linuxlinux_kernelMatch2.6.3rc4
OR
linuxlinux_kernelMatch2.6.4
OR
linuxlinux_kernelMatch2.6.4rc1
OR
linuxlinux_kernelMatch2.6.4rc2
OR
linuxlinux_kernelMatch2.6.4rc3
OR
linuxlinux_kernelMatch2.6.5
OR
linuxlinux_kernelMatch2.6.5rc1
OR
linuxlinux_kernelMatch2.6.5rc2
OR
linuxlinux_kernelMatch2.6.5rc3
OR
linuxlinux_kernelMatch2.6.6
OR
linuxlinux_kernelMatch2.6.6rc1
OR
linuxlinux_kernelMatch2.6.6rc2
OR
linuxlinux_kernelMatch2.6.6rc3
OR
linuxlinux_kernelMatch2.6.7
OR
linuxlinux_kernelMatch2.6.7rc1
OR
linuxlinux_kernelMatch2.6.7rc2
OR
linuxlinux_kernelMatch2.6.7rc3
OR
linuxlinux_kernelMatch2.6.8
OR
linuxlinux_kernelMatch2.6.8rc1
OR
linuxlinux_kernelMatch2.6.8rc2
OR
linuxlinux_kernelMatch2.6.8rc3
OR
linuxlinux_kernelMatch2.6.8rc4
OR
linuxlinux_kernelMatch2.6.8.1
OR
linuxlinux_kernelMatch2.6.8.1.5
OR
linuxlinux_kernelMatch2.6.8.1.5386
OR
linuxlinux_kernelMatch2.6.8.1.5686
OR
linuxlinux_kernelMatch2.6.8.1.5686_smp
OR
linuxlinux_kernelMatch2.6.8.1.5amd64
OR
linuxlinux_kernelMatch2.6.8.1.5amd64_k8
OR
linuxlinux_kernelMatch2.6.8.1.5amd64_k8_smp
OR
linuxlinux_kernelMatch2.6.8.1.5amd64_xeon
OR
linuxlinux_kernelMatch2.6.8.1.5k7
OR
linuxlinux_kernelMatch2.6.8.1.5k7_smp
OR
linuxlinux_kernelMatch2.6.8.1.5power3
OR
linuxlinux_kernelMatch2.6.8.1.5power3_smp
OR
linuxlinux_kernelMatch2.6.8.1.5power4
OR
linuxlinux_kernelMatch2.6.8.1.5power4_smp
OR
linuxlinux_kernelMatch2.6.8.1.5powerpc
OR
linuxlinux_kernelMatch2.6.8.1.5powerpc_smp
OR
linuxlinux_kernelMatch2.6.9
OR
linuxlinux_kernelMatch2.6.92.6.20
OR
linuxlinux_kernelMatch2.6.9rc1
OR
linuxlinux_kernelMatch2.6.9rc2
OR
linuxlinux_kernelMatch2.6.9rc3
OR
linuxlinux_kernelMatch2.6.9rc4
OR
linuxlinux_kernelMatch2.6.10
OR
linuxlinux_kernelMatch2.6.10rc1
OR
linuxlinux_kernelMatch2.6.10rc2
OR
linuxlinux_kernelMatch2.6.10rc3
OR
linuxlinux_kernelMatch2.6.11
OR
linuxlinux_kernelMatch2.6.11x86_64
OR
linuxlinux_kernelMatch2.6.11rc1
OR
linuxlinux_kernelMatch2.6.11rc2
OR
linuxlinux_kernelMatch2.6.11rc3
OR
linuxlinux_kernelMatch2.6.11rc4
OR
linuxlinux_kernelMatch2.6.11rc5
OR
linuxlinux_kernelMatch2.6.11.1
OR
linuxlinux_kernelMatch2.6.11.2
OR
linuxlinux_kernelMatch2.6.11.3
OR
linuxlinux_kernelMatch2.6.11.4
OR
linuxlinux_kernelMatch2.6.11.5
OR
linuxlinux_kernelMatch2.6.11.6
OR
linuxlinux_kernelMatch2.6.11.7
OR
linuxlinux_kernelMatch2.6.11.8
OR
linuxlinux_kernelMatch2.6.11.9
OR
linuxlinux_kernelMatch2.6.11.10
OR
linuxlinux_kernelMatch2.6.11.11
OR
linuxlinux_kernelMatch2.6.11.12
OR
linuxlinux_kernelMatch2.6.12
OR
linuxlinux_kernelMatch2.6.12rc1
OR
linuxlinux_kernelMatch2.6.12rc2
OR
linuxlinux_kernelMatch2.6.12rc3
OR
linuxlinux_kernelMatch2.6.12rc4
OR
linuxlinux_kernelMatch2.6.12rc5
OR
linuxlinux_kernelMatch2.6.12rc6
OR
linuxlinux_kernelMatch2.6.12.1
OR
linuxlinux_kernelMatch2.6.12.2
OR
linuxlinux_kernelMatch2.6.12.3
OR
linuxlinux_kernelMatch2.6.12.4
OR
linuxlinux_kernelMatch2.6.12.5
OR
linuxlinux_kernelMatch2.6.12.6
OR
linuxlinux_kernelMatch2.6_test9_cvs

References

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.1%