Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-6126

Опубликовано: 03 июл. 2024
Источник: redhat
CVSS3: 3.2
EPSS Низкий

Описание

A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.

Отчет

This vulnerability requires enabling the pam_env.so's "user_readenv" option. It disabled by default in Fedora and RHEL, and marked as deprecated/unsafe. In Debian/OpenSUSE it has enabled by default.

Меры по смягчению последствий

Disable pam_env's user_readenv option in PAM config.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10cockpitNot affected
Red Hat Enterprise Linux 7cockpitOut of support scope
Red Hat Enterprise Linux 8cockpitFix deferred
Red Hat Enterprise Linux 9cockpitFixedRHSA-2024:932512.11.2024
Red Hat Enterprise Linux 9cockpitFixedRHSA-2024:932512.11.2024

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2292897cockpit: Authenticated user can kill any process when enabling pam_env's user_readenv option

EPSS

Процентиль: 3%
0.00019
Низкий

3.2 Low

CVSS3

Связанные уязвимости

CVSS3: 3.2
ubuntu
около 1 года назад

A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.

CVSS3: 3.2
nvd
около 1 года назад

A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.

CVSS3: 3.2
debian
около 1 года назад

A flaw was found in the cockpit package. This flaw allows an authentic ...

suse-cvrf
около 1 года назад

Security update for cockpit

CVSS3: 3.2
github
около 1 года назад

A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.

EPSS

Процентиль: 3%
0.00019
Низкий

3.2 Low

CVSS3

Уязвимость CVE-2024-6126