Vulnerability Description
tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Tuned | 2.10.0 |
| Fedoraproject | Fedora | 17 |
| Redhat | Enterprise Linux | 6.0 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6136Issue TrackingThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2012-6136Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6136Issue TrackingThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2012-6136Third Party Advisory
FAQ
What is CVE-2012-6136?
CVE-2012-6136 is a vulnerability with a CVSS score of 5.5 (MEDIUM). tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes.
How severe is CVE-2012-6136?
CVE-2012-6136 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-6136?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Tuned, Fedoraproject Fedora, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.