Vulnerability identifier: #VU99893
Vulnerability risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to gain access to sensitive information.
The __block_prepare_write function in fs/buffer.c for Linux kernel 2.6.x before 2.6.13 does not properly clear buffers during certain error conditions, which allows local users to read portions of files that have been unlinked.
Mitigation
Install update from vendor's repository.
Vulnerable software versions
Linux kernel: All versions
External links
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207463
https://www.us.debian.org/security/2006/dsa-1233
https://www.ubuntu.com/usn/usn-395-1
https://secunia.com/advisories/23370
https://secunia.com/advisories/23384
https://www.novell.com/linux/security/advisories/2006_79_kernel.html
https://www.securityfocus.com/bid/21522
https://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
https://rhn.redhat.com/errata/RHSA-2007-0014.html
https://secunia.com/advisories/23752
https://secunia.com/advisories/23997
https://secunia.com/advisories/24206
https://www.mandriva.com/security/advisories?name=MDKSA-2007:012
https://www.mandriva.com/security/advisories?name=MDKSA-2007:025
https://secunia.com/advisories/23474
https://osvdb.org/31376
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11701
https://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=152becd26e0563aefdbc4fd1fe491928efe92d1f
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.