Show plain JSON{"id": "CVE-2024-6126", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "secalert@redhat.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 3.2, "attackVector": "LOCAL", "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L", "integrityImpact": "NONE", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 1.5}]}, "published": "2024-07-03T15:15:06.470", "references": [{"url": "https://access.redhat.com/security/cve/CVE-2024-6126", "source": "secalert@redhat.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292897", "source": "secalert@redhat.com"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Primary", "source": "secalert@redhat.com", "description": [{"lang": "en", "value": "CWE-400"}]}], "descriptions": [{"lang": "en", "value": "A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack."}, {"lang": "es", "value": "Se encontr\u00f3 un defecto en el paquete de la cabina. Esta falla permite que un usuario autenticado finalice cualquier proceso al habilitar la opci\u00f3n user_readenv de pam_env, lo que conduce a un ataque de denegaci\u00f3n de servicio (DoS)."}], "lastModified": "2024-07-05T12:55:51.367", "sourceIdentifier": "secalert@redhat.com"}