An update for cockpit is now available for openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1842
Final
1.0
1.0
2024-07-12
Initial
2024-07-12
2024-07-12
openEuler SA Tool V1.0
2024-07-12
cockpit security update
An update for cockpit is now available for openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-24.03-LTS,openEuler-22.03-LTS-SP4,openEuler-22.03-LTS-SP1
Cockpit makes GNU/Linux discoverable. See Linux server in a web browser and perform system tasks with a mouse. It’s easy to start containers, administer storage, configure networks, and inspect logs with this package.
Security Fix(es):
A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.(CVE-2024-6126)
An update for cockpit is now available for openEuler-22.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of low. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Low
cockpit
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1842
https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-6126
https://nvd.nist.gov/vuln/detail/CVE-2024-6126
openEuler-22.03-LTS-SP3
openEuler-20.03-LTS-SP4
openEuler-24.03-LTS
openEuler-22.03-LTS-SP4
openEuler-22.03-LTS-SP1
cockpit-cockpit-machines-178-17.oe2203sp3.noarch.rpm
cockpit-cockpit-machines-ovirt-178-17.oe2203sp3.noarch.rpm
cockpit-help-178-17.oe2203sp3.noarch.rpm
cockpit-cockpit-machines-178-13.oe2003sp4.noarch.rpm
cockpit-cockpit-machines-ovirt-178-13.oe2003sp4.noarch.rpm
cockpit-help-178-13.oe2003sp4.noarch.rpm
cockpit-help-309-2.oe2403.noarch.rpm
cockpit-cockpit-machines-178-17.oe2203sp4.noarch.rpm
cockpit-cockpit-machines-ovirt-178-17.oe2203sp4.noarch.rpm
cockpit-help-178-17.oe2203sp4.noarch.rpm
cockpit-cockpit-machines-178-17.oe2203sp1.noarch.rpm
cockpit-cockpit-machines-ovirt-178-17.oe2203sp1.noarch.rpm
cockpit-help-178-17.oe2203sp1.noarch.rpm
cockpit-178-17.oe2203sp3.aarch64.rpm
cockpit-debuginfo-178-17.oe2203sp3.aarch64.rpm
cockpit-debugsource-178-17.oe2203sp3.aarch64.rpm
cockpit-devel-178-17.oe2203sp3.aarch64.rpm
cockpit-178-13.oe2003sp4.aarch64.rpm
cockpit-debuginfo-178-13.oe2003sp4.aarch64.rpm
cockpit-debugsource-178-13.oe2003sp4.aarch64.rpm
cockpit-devel-178-13.oe2003sp4.aarch64.rpm
cockpit-309-2.oe2403.aarch64.rpm
cockpit-debuginfo-309-2.oe2403.aarch64.rpm
cockpit-debugsource-309-2.oe2403.aarch64.rpm
cockpit-devel-309-2.oe2403.aarch64.rpm
cockpit-178-17.oe2203sp4.aarch64.rpm
cockpit-debuginfo-178-17.oe2203sp4.aarch64.rpm
cockpit-debugsource-178-17.oe2203sp4.aarch64.rpm
cockpit-devel-178-17.oe2203sp4.aarch64.rpm
cockpit-178-17.oe2203sp1.aarch64.rpm
cockpit-debuginfo-178-17.oe2203sp1.aarch64.rpm
cockpit-debugsource-178-17.oe2203sp1.aarch64.rpm
cockpit-devel-178-17.oe2203sp1.aarch64.rpm
cockpit-178-17.oe2203sp3.src.rpm
cockpit-178-13.oe2003sp4.src.rpm
cockpit-309-2.oe2403.src.rpm
cockpit-178-17.oe2203sp4.src.rpm
cockpit-178-17.oe2203sp1.src.rpm
cockpit-178-17.oe2203sp3.x86_64.rpm
cockpit-debuginfo-178-17.oe2203sp3.x86_64.rpm
cockpit-debugsource-178-17.oe2203sp3.x86_64.rpm
cockpit-devel-178-17.oe2203sp3.x86_64.rpm
cockpit-178-13.oe2003sp4.x86_64.rpm
cockpit-debuginfo-178-13.oe2003sp4.x86_64.rpm
cockpit-debugsource-178-13.oe2003sp4.x86_64.rpm
cockpit-devel-178-13.oe2003sp4.x86_64.rpm
cockpit-309-2.oe2403.x86_64.rpm
cockpit-debuginfo-309-2.oe2403.x86_64.rpm
cockpit-debugsource-309-2.oe2403.x86_64.rpm
cockpit-devel-309-2.oe2403.x86_64.rpm
cockpit-178-17.oe2203sp4.x86_64.rpm
cockpit-debuginfo-178-17.oe2203sp4.x86_64.rpm
cockpit-debugsource-178-17.oe2203sp4.x86_64.rpm
cockpit-devel-178-17.oe2203sp4.x86_64.rpm
cockpit-178-17.oe2203sp1.x86_64.rpm
cockpit-debuginfo-178-17.oe2203sp1.x86_64.rpm
cockpit-debugsource-178-17.oe2203sp1.x86_64.rpm
cockpit-devel-178-17.oe2203sp1.x86_64.rpm
A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env s user_readenv option, which leads to a denial of service (DoS) attack.
2024-07-12
CVE-2024-6126
openEuler-22.03-LTS-SP3
openEuler-20.03-LTS-SP4
openEuler-24.03-LTS
openEuler-22.03-LTS-SP4
openEuler-22.03-LTS-SP1
Low
3.2
AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L
cockpit security update
2024-07-12
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1842