Описание
tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes.
Ссылки
- Issue TrackingThird Party Advisory
- Third Party Advisory
- Issue TrackingThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:redhat:tuned:2.10.0:-:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
Конфигурация 3
Одно из
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Конфигурация 4
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
EPSS
Процентиль: 7%
0.00026
Низкий
5.5 Medium
CVSS3
4.9 Medium
CVSS2
Дефекты
CWE-276
Связанные уязвимости
CVSS3: 5.5
ubuntu
около 6 лет назад
tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes.
redhat
больше 13 лет назад
tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes.
CVSS3: 5.5
debian
около 6 лет назад
tuned 2.10.0 creates its PID file with insecure permissions which allo ...
github
почти 4 года назад
tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes.
EPSS
Процентиль: 7%
0.00026
Низкий
5.5 Medium
CVSS3
4.9 Medium
CVSS2
Дефекты
CWE-276