← Zuruck zu CVEs
CVE-2024-6126
LOW3.2
Beschreibung
A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.
CVE Details
CVSS v3.1 Bewertung3.2
SchweregradLOW
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionREQUIRED
Veroffentlicht7/3/2024
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-400
Referenzen
https://access.redhat.com/errata/RHSA-2024:9325(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2024-6126(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2292897(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2024-6126(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=2292897(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.