Lucene search

K
cve[email protected]CVE-2006-0095
HistoryJan 06, 2006 - 11:03 a.m.

CVE-2006-0095

2006-01-0611:03:00
web.nvd.nist.gov
31
dm-crypt
linux kernel
vulnerability
memory disclosure
nvd

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

AI Score

4.8

Confidence

High

EPSS

0.001

Percentile

28.0%

dm-crypt in Linux kernel 2.6.15 and earlier does not clear a structure before it is freed, which leads to a memory disclosure that could allow local users to obtain sensitive information about a cryptographic key.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.6.0
OR
linuxlinux_kernelMatch2.6.1
OR
linuxlinux_kernelMatch2.6.2
OR
linuxlinux_kernelMatch2.6.3
OR
linuxlinux_kernelMatch2.6.4
OR
linuxlinux_kernelMatch2.6.5
OR
linuxlinux_kernelMatch2.6.6
OR
linuxlinux_kernelMatch2.6.7
OR
linuxlinux_kernelMatch2.6.8
OR
linuxlinux_kernelMatch2.6.8.1
OR
linuxlinux_kernelMatch2.6.92.6.20
OR
linuxlinux_kernelMatch2.6.10
OR
linuxlinux_kernelMatch2.6.11
OR
linuxlinux_kernelMatch2.6.11.1
OR
linuxlinux_kernelMatch2.6.11.2
OR
linuxlinux_kernelMatch2.6.11.3
OR
linuxlinux_kernelMatch2.6.11.4
OR
linuxlinux_kernelMatch2.6.11.5
OR
linuxlinux_kernelMatch2.6.11.6
OR
linuxlinux_kernelMatch2.6.11.7
OR
linuxlinux_kernelMatch2.6.11.8
OR
linuxlinux_kernelMatch2.6.11.9
OR
linuxlinux_kernelMatch2.6.11.10
OR
linuxlinux_kernelMatch2.6.11.11
OR
linuxlinux_kernelMatch2.6.11.12
OR
linuxlinux_kernelMatch2.6.12
OR
linuxlinux_kernelMatch2.6.12.1
OR
linuxlinux_kernelMatch2.6.12.2
OR
linuxlinux_kernelMatch2.6.12.3
OR
linuxlinux_kernelMatch2.6.12.4
OR
linuxlinux_kernelMatch2.6.13
OR
linuxlinux_kernelMatch2.6.14
OR
linuxlinux_kernelMatch2.6.14rc1
OR
linuxlinux_kernelMatch2.6.14rc2
OR
linuxlinux_kernelMatch2.6.14rc3
OR
linuxlinux_kernelMatch2.6.14rc4
OR
linuxlinux_kernelMatch2.6.14.1
OR
linuxlinux_kernelMatch2.6.14.2
OR
linuxlinux_kernelMatch2.6.14.3
OR
linuxlinux_kernelMatch2.6.14.4
OR
linuxlinux_kernelMatch2.6.15
OR
linuxlinux_kernelMatch2.6.15rc1
OR
linuxlinux_kernelMatch2.6.15rc3
OR
linuxlinux_kernelMatch2.6.15rc4
OR
linuxlinux_kernelMatch2.6.15rc5
OR
linuxlinux_kernelMatch2.6.15rc6
OR
linuxlinux_kernelMatch2.6.15rc7
VendorProductVersionCPE
linuxlinux_kernel2.6.14cpe:/o:linux:linux_kernel:2.6.14:rc4::
linuxlinux_kernel2.6.10cpe:/o:linux:linux_kernel:2.6.10:::
linuxlinux_kernel2.6.3cpe:/o:linux:linux_kernel:2.6.3:::
linuxlinux_kernel2.6.7cpe:/o:linux:linux_kernel:2.6.7:::
linuxlinux_kernel2.6.11cpe:/o:linux:linux_kernel:2.6.11:::
linuxlinux_kernel2.6.11.11cpe:/o:linux:linux_kernel:2.6.11.11:::
linuxlinux_kernel2.6.11.9cpe:/o:linux:linux_kernel:2.6.11.9:::
linuxlinux_kernel2.6.12.1cpe:/o:linux:linux_kernel:2.6.12.1:::
linuxlinux_kernel2.6.14.3cpe:/o:linux:linux_kernel:2.6.14.3:::
linuxlinux_kernel2.6.11.8cpe:/o:linux:linux_kernel:2.6.11.8:::
Rows per page:
1-10 of 471

References

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

AI Score

4.8

Confidence

High

EPSS

0.001

Percentile

28.0%