← Retour aux CVEs
CVE-2024-6126
LOW3.2
Description
A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.
Details CVE
Score CVSS v3.13.2
SeveriteLOW
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurREQUIRED
Publie7/3/2024
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-400
References
https://access.redhat.com/errata/RHSA-2024:9325(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2024-6126(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2292897(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2024-6126(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=2292897(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.