← Back to CVEs
CVE-2024-6126
LOW3.2
Description
A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.
CVE Details
CVSS v3.1 Score3.2
SeverityLOW
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionREQUIRED
Published7/3/2024
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-400
References
https://access.redhat.com/errata/RHSA-2024:9325(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2024-6126(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2292897(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2024-6126(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=2292897(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.