First published: Wed Nov 20 2019(Updated: )
tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Tuned | =2.10.0 | |
Fedoraproject Fedora | =17 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Debian Debian Linux | =10.0 | |
debian/tuned | 2.15.0-1 2.20.0-1 2.22.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6136 refers to a vulnerability in tuned 2.10.0 that creates its PID file with insecure permissions, allowing local users to kill arbitrary processes.
The severity of CVE-2012-6136 is medium, with a severity value of 5.5.
CVE-2012-6136 affects tuned versions 2.10.0-1, 2.15.0-1, and 2.20.0-1 on Debian and Red Hat based systems.
To fix CVE-2012-6136, update tuned to a version that includes the fix. This may involve upgrading to a newer package version or applying a patch provided by the vendor.
You can find more information about CVE-2012-6136 on the Red Hat Bugzilla page (https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6136) and the Debian Security Tracker (https://security-tracker.debian.org/tracker/CVE-2012-6136).